1. Tell us about yourself.
Answer:
My name is ____________. I have a background in education and training with specialization in ____________. I am passionate about teaching, mentoring students, and helping learners gain both theoretical knowledge and practical skills. I am hardworking, adaptable, and committed to professional ethics and continuous learning.
2. Why do you want to work as a Tutor II?
Answer:
I want to work as a Tutor II because I enjoy teaching and sharing knowledge with students. This position gives me an opportunity to contribute to academic development, research, and community service while also improving my professional experience.
3. What are the duties of a Tutor II?
Answer:
The duties of a Tutor II include:
Teaching and assisting students in practical and theoretical lessons.
Preparing teaching materials.
Conducting assessments and marking assignments.
Supervising students during practical sessions.
Participating in research and consultancy.
Providing academic guidance to students.
Maintaining academic discipline and ethics.
4. What teaching methods can you use in class?
Answer:
I can use several teaching methods depending on the topic and learners’ needs, such as:
Lecture method
Discussion method
Demonstration method
Group work
Question and answer method
Problem-solving approach
Practical and project-based learning
5. How do you handle students with different learning abilities?
Answer:
I use learner-centered approaches by identifying students’ strengths and weaknesses, giving additional support where needed, encouraging group discussions, and using different teaching aids to accommodate different learning styles.
6. How do you manage classroom discipline?
Answer:
I manage classroom discipline by setting clear rules and expectations, treating students fairly, encouraging respect, maintaining professionalism, and addressing problems calmly and objectively.
7. What is the importance of lesson planning?
Answer:
Lesson planning helps a teacher organize content, manage time effectively, achieve learning objectives, select appropriate teaching methods, and evaluate students properly.
8. What qualities make a good teacher?
Answer:
A good teacher should:
Have strong communication skills
Be patient and professional
Be knowledgeable in the subject area
Be creative and innovative
Be ethical and responsible
Motivate learners
Be committed to continuous learning
9. How do you assess students’ performance?
Answer:
I assess students using:
Tests and examinations
Assignments
Presentations
Practical exercises
Projects
Continuous assessment methods
10. What is student-centered learning?
Answer:
Student-centered learning is an approach where learners actively participate in the learning process while the teacher acts as a facilitator. It encourages critical thinking, participation, and problem-solving.
11. How can technology improve teaching and learning?
Answer:
Technology improves teaching and learning through:
Online learning platforms
Multimedia presentations
Virtual simulations
Easy access to educational resources
Better communication between teachers and students
12. What challenges may affect teaching and how can you overcome them?
Answer:
Some challenges include lack of resources, large classes, low student motivation, and limited technology. These can be addressed through creativity, proper planning, teamwork, effective communication, and continuous professional development.
13. What is the difference between formative and summative assessment?
Answer:
Formative assessment is conducted during the learning process to monitor progress.
Summative assessment is conducted at the end of a course or topic to evaluate overall performance.
14. How would you motivate students?
Answer:
I would motivate students by encouraging participation, recognizing achievements, giving constructive feedback, connecting lessons to real-life situations, and creating a supportive learning environment.
15. How do you handle examination malpractice?
Answer:
I would follow institutional regulations, maintain fairness, report incidents appropriately, educate students on academic integrity, and ensure proper supervision during examinations.
16. What is communication?
Answer:
Communication is the process of exchanging information, ideas, thoughts, or messages between people through speaking, writing, gestures, or other means.
17. What are the barriers to effective communication?
Answer:
Barriers include:
Language differences
Noise
Poor listening skills
Emotional factors
Cultural differences
Lack of feedback
18. What is curriculum?
Answer:
Curriculum is a planned set of learning experiences, subjects, objectives, content, and assessment methods designed to achieve educational goals.
19. What is the importance of research in education?
Answer:
Research helps improve teaching methods, solve educational problems, generate new knowledge, and support evidence-based decision-making.
20. Explain the meaning of professionalism.
Answer:
Professionalism refers to behaving with competence, ethics, responsibility, integrity, and respect while performing duties.
Scenario-Based Oral Questions
21. What would you do if students are not participating in class?
Answer:
I would use interactive teaching methods, ask engaging questions, encourage group discussions, create a friendly learning environment, and motivate students to express themselves.
22. What would you do if a student continuously performs poorly?
Answer:
I would identify the root causes, provide guidance and counseling, offer extra support, encourage peer learning, and monitor the student’s progress closely.
23. Suppose there is conflict between students in class. How would you handle it?
Answer:
I would listen to both sides fairly, identify the cause of the conflict, encourage peaceful resolution, remind them of institutional rules, and involve relevant authorities if necessary.
24. What would you do if teaching resources are limited?
Answer:
I would improvise teaching materials, use available technology, encourage group sharing of resources, and apply creative teaching approaches.
25. How would you handle pressure and workload?
Answer:
I would prioritize tasks, manage time effectively, maintain organization, cooperate with colleagues, and remain focused on achieving objectives.
Cognitive and Analytical Oral Questions
26. Why is critical thinking important in education?
Answer:
Critical thinking enables learners to analyze information, solve problems, make informed decisions, and become independent thinkers.
27. What is the role of ethics in teaching?
Answer:
Ethics guide teachers to act fairly, maintain confidentiality, respect learners, avoid discrimination, and uphold professional standards.
28. How can education contribute to national development?
Answer:
Education develops skilled human resources, promotes innovation, reduces poverty, improves productivity, and supports social and economic growth.
29. What is inclusive education?
Answer:
Inclusive education ensures that all learners, including those with disabilities or special needs, have equal access to quality education.
30. Why should teachers engage in continuous professional development?
Answer:
Continuous professional development helps teachers improve skills, update knowledge, adapt to new technologies, and enhance teaching effectiveness.
Computer Science Related Oral Questions (for ICT/Computer Science Applicants)
31. What is a computer network?
Answer:
A computer network is a system that connects computers and devices to share data and resources.
32. What is the difference between RAM and ROM?
Answer:
RAM is temporary memory used while a computer is running.
ROM is permanent memory used to store essential startup instructions.
33. What is a database?
Answer:
A database is an organized collection of related data stored electronically for easy access, management, and retrieval.
34. What is cybersecurity?
Answer:
Cybersecurity is the protection of computer systems, networks, and data from unauthorized access, attacks, or damage.
35. What is the importance of backup?
Answer:
Backup helps protect data against loss caused by system failure, viruses, accidental deletion, or disasters.
Final Interview Questions
36. Why should we hire you?
Answer:
You should hire me because I possess the required academic qualifications, communication skills, commitment to teaching, teamwork spirit, and willingness to contribute positively to the institution.
37. What are your strengths?
Answer:
My strengths include teamwork, communication skills, adaptability, problem-solving ability, professionalism, and commitment to learning.
38. What are your weaknesses?
Answer:
One of my weaknesses is spending too much time ensuring work is perfect, but I am learning to balance quality and time management effectively.
39. Where do you see yourself in five years?
Answer:
In five years, I see myself growing professionally, contributing to research and academic development, and becoming a highly competent educator.
40. Do you have any questions for us?
Answer:
Yes. I would like to know more about professional development opportunities, teaching expectations, and research support within the institution.
Tips for Oral Interview Success
Dress professionally.
Arrive early.
Speak clearly and confidently.
Maintain eye contact.
Be honest and concise.
Support answers with examples where possible.
Show professionalism and positive attitude.
Demonstrate knowledge of your subject area.
Practice common interview questions before the interview.
Tuesday, May 19, 2026
TUTOR II ORAL INTERVIEW QUESTIONS AND ANSWERS
Tutor II Oral Interview Questions and Answers
Monday, May 18, 2026
EXAMINATION OFFICER (COMPUTER SCIENCE) QUESTIONS AND ANSWERS
Examination Officer II (Computer Science)
Section A: Examination Management
1. A university examination officer discovers that some students have been allocated to the wrong examination rooms due to a database mismatch. What should be done FIRST?
A. Print new examination cards immediately
B. Suspend all examinations
C. Verify the student allocation records from the database backup
D. Remove all students from the system
Answer: C
2. During online examination registration, students complain that the portal becomes very slow when many users log in simultaneously. Which concept BEST explains this issue?
A. Data redundancy
B. Network congestion
C. Deadlock
D. Data mining
Answer: B
3. An examination officer notices unauthorized changes in examination marks. Which security principle has MOST likely been violated?
A. Availability
B. Confidentiality
C. Integrity
D. Scalability
Answer: C
4. A candidate claims that his results disappeared from the examination system after a power outage. Which mechanism would BEST help prevent such data loss?
A. Antivirus software
B. Database transaction logs and backups
C. Firewall installation
D. Screen locking
Answer: B
5. An institution wants examination records to remain accessible even if one server fails. Which solution is MOST appropriate?
A. Data normalization
B. Server redundancy
C. File compression
D. Encryption
Answer: B
6.
A lecturer accidentally uploads wrong examination scores to the system. Which database feature can help restore previous correct data?
A. Rollback
B. Sorting
C. Compilation
D. Query optimization
Answer: A
7. The examination office wants only authorized staff to access examination results. Which approach should be implemented?
A. Open access policy
B. Role-based access control
C. Data duplication
D. Shared passwords
Answer: B
8. A student attempts to log into the examination system multiple times using random passwords. This is an example of:
A. Brute-force attack
B. Phishing
C. Data mining
D. Spoofing
Answer: A
9. An examination database contains repeated student information in several tables, causing inconsistencies. Which process can solve this problem?
A. Compilation
B. Normalization
C. Encryption
D. Routing
Answer: B
10. An institution plans to move examination services to cloud computing. Which advantage is MOST significant?
A. Reduced accessibility
B. Increased hardware dependency
C. Scalability and remote access
D. Elimination of internet usage
Answer: C
Section B: Database and Information Systems
11. An examination officer wants to retrieve all students who scored above 80 in Database Systems. Which SQL command should be used?
A. DELETE
B. UPDATE
C. SELECT
D. DROP
Answer: C
12. A database administrator creates relationships between Students and Results tables using student IDs. The student ID acts as a:
A. Foreign key
B. Candidate key
C. Super key
D. Composite key
Answer: A
13. A university stores examination records in a centralized database server. What is the MAIN advantage?
A. Increased duplication
B. Easier data management
C. Reduced security
D. Slower processing
Answer: B
14. An examination system suddenly crashes because two transactions access the same data simultaneously. Which issue is this?
A. Concurrency conflict
B. Token passing
C. Fragmentation
D. Compression
Answer: A
15. The examination office needs a report showing the average marks per course. Which SQL function is MOST suitable?
A. COUNT()
B. SUM()
C. AVG()
D. MAX()
Answer: C
16. A student record is deleted accidentally. Which database mechanism can recover it?
A. Primary key
B. Backup restoration
C. Query processing
D. Indexing
Answer: B
17. A database index is primarily used to:
A. Increase storage requirements
B. Speed up data retrieval
C. Reduce security
D. Duplicate records
Answer: B
18. An examination officer wants to prevent duplicate student registration numbers in the database. Which constraint should be applied?
A. DEFAULT
B. CHECK
C. UNIQUE
D. NULL
Answer: C
19. The examination office needs to combine student information from multiple campuses into one system. Which approach is BEST?
A. Distributed database system
B. Standalone system
C. Analog processing
D. Manual recording
Answer: A
20. A query is taking too long to execute because the table has millions of rows. Which action can improve performance?
A. Deleting all rows
B. Adding indexes
C. Removing constraints
D. Increasing redundancy
Answer: B
Section C: Networking and Security
A. DELETE
B. UPDATE
C. SELECT
D. DROP
Answer: C
12. A database administrator creates relationships between Students and Results tables using student IDs. The student ID acts as a:
A. Foreign key
B. Candidate key
C. Super key
D. Composite key
Answer: A
13. A university stores examination records in a centralized database server. What is the MAIN advantage?
A. Increased duplication
B. Easier data management
C. Reduced security
D. Slower processing
Answer: B
14. An examination system suddenly crashes because two transactions access the same data simultaneously. Which issue is this?
A. Concurrency conflict
B. Token passing
C. Fragmentation
D. Compression
Answer: A
15. The examination office needs a report showing the average marks per course. Which SQL function is MOST suitable?
A. COUNT()
B. SUM()
C. AVG()
D. MAX()
Answer: C
16. A student record is deleted accidentally. Which database mechanism can recover it?
A. Primary key
B. Backup restoration
C. Query processing
D. Indexing
Answer: B
17. A database index is primarily used to:
A. Increase storage requirements
B. Speed up data retrieval
C. Reduce security
D. Duplicate records
Answer: B
18. An examination officer wants to prevent duplicate student registration numbers in the database. Which constraint should be applied?
A. DEFAULT
B. CHECK
C. UNIQUE
D. NULL
Answer: C
19. The examination office needs to combine student information from multiple campuses into one system. Which approach is BEST?
A. Distributed database system
B. Standalone system
C. Analog processing
D. Manual recording
Answer: A
20. A query is taking too long to execute because the table has millions of rows. Which action can improve performance?
A. Deleting all rows
B. Adding indexes
C. Removing constraints
D. Increasing redundancy
Answer: B
Section C: Networking and Security
21. An online examination system becomes inaccessible due to excessive traffic from attackers. This is MOST likely a:
A. Phishing attack
B. SQL injection
C. Denial-of-Service attack
D. Trojan attack
Answer: C
22. An institution installs a firewall in the examination office network. The MAIN purpose is to:
A. Increase monitor size
B. Control network traffic
C. Speed up typing
D. Replace antivirus software
Answer: B
23. A staff member receives an email requesting examination passwords and system credentials. This is an example of:
A. Spoofing
B. Phishing
C. Encryption
D. Multiprocessing
Answer: B
24. Which protocol is MOST secure for transmitting examination results over the internet?
A. HTTP
B. FTP
C. HTTPS
D. Telnet
Answer: C
25. An examination officer notices that computers restart automatically after opening unknown USB files. Which malware is MOST likely responsible?
A. Worm
B. Trojan
C. Spyware
D. Adware
Answer: A
26. The examination department uses biometric authentication. Which security objective does this MOST support?
A. Authentication
B. Compression
C. Fragmentation
D. Multiplexing
Answer: A
27. A hacker inserts malicious SQL commands into a login form. This attack is called:
A. Brute force
B. SQL Injection
C. Sniffing
D. Spoofing
Answer: B
28. An examination officer wants to ensure that data cannot be read by unauthorized users during transmission. Which method should be used?
A. Formatting
B. Encryption
C. Partitioning
D. Indexing
Answer: B
29. A network administrator divides a network into smaller sections to improve security and performance. This process is called:
A. Segmentation
B. Duplication
C. Broadcasting
D. Multiprocessing
Answer: A
30. Which device forwards data packets between different networks?
A. Hub
B. Switch
C. Router
D. Repeater
Answer: C
Section D: Operating Systems and Computer Applications
A. Phishing attack
B. SQL injection
C. Denial-of-Service attack
D. Trojan attack
Answer: C
22. An institution installs a firewall in the examination office network. The MAIN purpose is to:
A. Increase monitor size
B. Control network traffic
C. Speed up typing
D. Replace antivirus software
Answer: B
23. A staff member receives an email requesting examination passwords and system credentials. This is an example of:
A. Spoofing
B. Phishing
C. Encryption
D. Multiprocessing
Answer: B
24. Which protocol is MOST secure for transmitting examination results over the internet?
A. HTTP
B. FTP
C. HTTPS
D. Telnet
Answer: C
25. An examination officer notices that computers restart automatically after opening unknown USB files. Which malware is MOST likely responsible?
A. Worm
B. Trojan
C. Spyware
D. Adware
Answer: A
26. The examination department uses biometric authentication. Which security objective does this MOST support?
A. Authentication
B. Compression
C. Fragmentation
D. Multiplexing
Answer: A
27. A hacker inserts malicious SQL commands into a login form. This attack is called:
A. Brute force
B. SQL Injection
C. Sniffing
D. Spoofing
Answer: B
28. An examination officer wants to ensure that data cannot be read by unauthorized users during transmission. Which method should be used?
A. Formatting
B. Encryption
C. Partitioning
D. Indexing
Answer: B
29. A network administrator divides a network into smaller sections to improve security and performance. This process is called:
A. Segmentation
B. Duplication
C. Broadcasting
D. Multiprocessing
Answer: A
30. Which device forwards data packets between different networks?
A. Hub
B. Switch
C. Router
D. Repeater
Answer: C
Section D: Operating Systems and Computer Applications
31. A computer used for examination processing freezes because too many applications are running simultaneously. Which issue is MOST likely occurring?
A. Resource exhaustion
B. Normalization
C. Encryption
D. Indexing
Answer: A
32. An examination officer accidentally closes a program without saving results data. Which memory type loses data immediately after power loss?
A. ROM
B. Cache
C. RAM
D. SSD
Answer: C
33. A university wants multiple users to access one server simultaneously. Which operating system feature supports this?
A. Single-user processing
B. Multi-user capability
C. File compression
D. Formatting
Answer: B
34. An examination office uses virtualization to run multiple operating systems on one physical server. The MAIN advantage is:
A. Increased hardware cost
B. Better resource utilization
C. Reduced storage
D. Slower performance
Answer: B
35. Which utility software helps detect and remove malicious software from examination computers?
A. Compiler
B. Antivirus
C. Assembler
D. Debugger
Answer: B
36. A staff member cannot print examination reports because the printer queue is full. Which operating system function is involved?
A. Process management
B. Memory management
C. Device management
D. File compression
Answer: C
37. An examination office plans to automate repetitive tasks such as report generation. Which tool is MOST suitable?
A. Scripting
B. Defragmentation
C. Formatting
D. Partitioning
Answer: A
38. A candidate’s results file becomes inaccessible due to corruption. Which file management strategy BEST reduces such risks?
A. Regular backups
B. Deleting old files
C. Renaming files daily
D. Disabling permissions
Answer: A
39. An operating system schedules processes to ensure fair CPU usage among users. This is handled by:
A. CPU scheduling
B. Encryption
C. Routing
D. Fragmentation
Answer: A
40. An examination officer needs to share files securely between offices. Which method is MOST appropriate?
A. Public USB sharing
B. Shared cloud storage with permissions
C. Open Wi-Fi transfer
D. Printing all files
Answer: B
Section E: Software Engineering and Systems Analysis
A. Resource exhaustion
B. Normalization
C. Encryption
D. Indexing
Answer: A
32. An examination officer accidentally closes a program without saving results data. Which memory type loses data immediately after power loss?
A. ROM
B. Cache
C. RAM
D. SSD
Answer: C
33. A university wants multiple users to access one server simultaneously. Which operating system feature supports this?
A. Single-user processing
B. Multi-user capability
C. File compression
D. Formatting
Answer: B
34. An examination office uses virtualization to run multiple operating systems on one physical server. The MAIN advantage is:
A. Increased hardware cost
B. Better resource utilization
C. Reduced storage
D. Slower performance
Answer: B
35. Which utility software helps detect and remove malicious software from examination computers?
A. Compiler
B. Antivirus
C. Assembler
D. Debugger
Answer: B
36. A staff member cannot print examination reports because the printer queue is full. Which operating system function is involved?
A. Process management
B. Memory management
C. Device management
D. File compression
Answer: C
37. An examination office plans to automate repetitive tasks such as report generation. Which tool is MOST suitable?
A. Scripting
B. Defragmentation
C. Formatting
D. Partitioning
Answer: A
38. A candidate’s results file becomes inaccessible due to corruption. Which file management strategy BEST reduces such risks?
A. Regular backups
B. Deleting old files
C. Renaming files daily
D. Disabling permissions
Answer: A
39. An operating system schedules processes to ensure fair CPU usage among users. This is handled by:
A. CPU scheduling
B. Encryption
C. Routing
D. Fragmentation
Answer: A
40. An examination officer needs to share files securely between offices. Which method is MOST appropriate?
A. Public USB sharing
B. Shared cloud storage with permissions
C. Open Wi-Fi transfer
D. Printing all files
Answer: B
Section E: Software Engineering and Systems Analysis
41. Before developing a new examination system, the institution gathers user requirements from staff and students. This phase is called:
A. Coding
B. Testing
C. Requirement analysis
D. Maintenance
Answer: C
42. A software developer tests whether the examination system modules work correctly together. This is known as:
A. Unit testing
B. Integration testing
C. Acceptance testing
D. Regression testing
Answer: B
43. An examination system is implemented in phases instead of all at once to reduce risk. This strategy is:
A. Parallel implementation
B. Phased implementation
C. Direct changeover
D. Pilot rejection
Answer: B
44. A programmer updates the examination software to fix discovered bugs after deployment. This activity is:
A. Feasibility study
B. Maintenance
C. Analysis
D. Documentation
Answer: B
45. An institution evaluates whether a proposed examination system is affordable and practical. This study is called:
A. Feasibility study
B. Stress testing
C. Benchmarking
D. Reverse engineering
Answer: A
46. A flowchart is mainly used to:
A. Encrypt data
B. Illustrate program logic
C. Remove malware
D. Configure hardware
Answer: B
47. A system analyst creates diagrams showing interactions between users and the examination system. These are called:
A. Use case diagrams
B. Pie charts
C. Histograms
D. Topologies
Answer: A
48. An examination office wants software that can be modified freely by developers. Which type is MOST suitable?
A. Proprietary software
B. Open-source software
C. Commercial software
D. Trial software
Answer: B
49. The examination system fails after new updates are installed. Which testing type ensures existing functions still work?
A. Regression testing
B. Alpha testing
C. White-box testing
D. Black-box testing
Answer: A
50. A software team uses Agile methodology for examination system development. Which characteristic BEST describes Agile?
A. Rigid planning only
B. Continuous feedback and iteration
C. No testing required
D. One-time deployment
Answer: B
Section F: ICT Ethics and Professionalism
51.
An examination officer shares student results with unauthorized individuals. Which ethical principle is violated?
A. Accountability
B. Confidentiality
C. Accessibility
D. Transparency
Answer: B
52.
A staff member installs pirated software in the examination office. This practice violates:
A. Data mining policies
B. Intellectual property rights
C. Cloud computing rules
D. Multiprocessing principles
Answer: B
53.
An examination officer discovers errors in released results. What is the MOST professional action?
A. Ignore the errors
B. Correct and communicate transparently
C. Delete all records
D. Blame students
Answer: B
54.
Using another programmer’s code without permission is an example of:
A. Virtualization
B. Plagiarism
C. Authentication
D. Benchmarking
Answer: B
55.
An institution introduces policies requiring strong passwords. This mainly improves:
A. Physical security
B. Logical security
C. File compression
D. Device cooling
Answer: B
56.
A staff member intentionally alters marks for personal gain. This act is BEST described as:
A. Professionalism
B. Cyber ethics violation
C. Data normalization
D. Optimization
Answer: B
57.
An examination officer is required to maintain accurate records and be answerable for actions performed. This principle is:
A. Accountability
B. Redundancy
C. Fragmentation
D. Scalability
Answer: A
58.
An institution stores examination records according to legal requirements for future reference. This process is:
A. Archiving
B. Routing
C. Debugging
D. Defragmentation
Answer: A
59.
A candidate requests correction of wrongly entered biodata before certification. Which data quality attribute is MOST relevant?
A. Accuracy
B. Compression
C. Replication
D. Availability
Answer: A
60.
An examination office establishes disaster recovery procedures. The MAIN objective is to:
A. Increase downtime
B. Ensure business continuity
C. Reduce internet usage
D. Eliminate backups
Answer: B
Section G: Advanced Scenario-Based Questions
61.
An examination portal crashes during online exams because the server CPU reaches 100% usage. Which upgrade would MOST directly improve performance?
A. Increasing RAM only
B. Replacing monitors
C. Upgrading CPU resources
D. Installing speakers
Answer: C
62.
Students are unable to access examination results because DNS services are down. What is the MAIN role of DNS?
A. Encrypting data
B. Translating domain names into IP addresses
C. Compressing files
D. Allocating memory
Answer: B
63.
An institution wants examination data synchronized automatically between campuses. Which technology BEST supports this?
A. Replication
B. Formatting
C. Defragmentation
D. Virtual memory
Answer: A
64.
An online examination platform logs users out automatically after inactivity. This primarily improves:
A. Availability
B. Security
C. Compression
D. Scalability
Answer: B
65.
The examination office introduces two-factor authentication. Which combination BEST represents this?
A. Username and username
B. Password and PIN
C. Password and fingerprint
D. Email and username
Answer: C
66.
A database administrator splits one large examination table into smaller related tables. Which process is this?
A. Redundancy
B. Normalization
C. Compilation
D. Encryption
Answer: B
67.
An institution needs to ensure examination data remains unchanged during transmission. Which technique BEST supports this?
A. Hashing
B. Formatting
C. Compression
D. Fragmentation
Answer: A
68.
A candidate submits online examination answers, but the internet disconnects before submission confirmation. Which database property ensures incomplete transactions are not saved?
A. Atomicity
B. Scalability
C. Virtualization
D. Multiplexing
Answer: A
69.
A university plans to store huge examination archives for many years at low cost. Which storage solution is MOST suitable?
A. Cache memory
B. Magnetic tape/cloud archival storage
C. CPU registers
D. ROM chips
Answer: B
70.
An examination officer needs graphical summaries of student performance trends. Which software category is MOST suitable?
A. Spreadsheet software
B. Antivirus software
C. Compiler software
D. Operating systems
Answer: A
Section H: Data Communication and Internet Technologies
71.
A university uses Wi‑Fi for examination office communication. Wi‑Fi is an example of:
A. Wired network
B. Wireless network
C. Optical storage
D. Parallel processing
Answer: B
72.
An examination officer sends confidential reports using email attachments protected by passwords. This mainly supports:
A. Data confidentiality
B. Data redundancy
C. Device management
D. Load balancing
Answer: A
73.
Which topology has a central device connecting all computers in the examination office?
A. Ring topology
B. Bus topology
C. Star topology
D. Mesh topology
Answer: C
74.
An institution experiences packet loss during online examinations. Which network issue is MOST likely responsible?
A. Low latency
B. Congestion
C. Authentication
D. Compression
Answer: B
75.
The examination department uses VPN technology for remote access. The MAIN advantage is:
A. Reduced security
B. Secure remote communication
C. Eliminating internet use
D. Faster typing speed
Answer: B
76.
An examination officer notices duplicate IP addresses causing communication failure. Which service can automatically assign unique IP addresses?
A. DNS
B. DHCP
C. FTP
D. SMTP
Answer: B
77.
A student accesses the examination portal using a smartphone. Which technology enables responsive display on mobile devices?
A. Responsive web design
B. Multiprocessing
C. Defragmentation
D. Normalization
Answer: A
78.
An institution uses video conferencing for remote viva examinations. Which network requirement is MOST critical?
A. High bandwidth
B. Low storage
C. Weak authentication
D. Reduced RAM
Answer: A
79.
An examination office experiences unauthorized wireless access. Which action BEST improves Wi‑Fi security?
A. Disable passwords
B. Enable WPA2/WPA3 encryption
C. Increase monitor size
D. Share credentials publicly
Answer: B
80.
The examination office website becomes inaccessible because its domain registration expired. Which service was MOST affected?
A. Hosting
B. Domain name registration
C. Routing
D. Indexing
Answer: B
Section I: Programming and Logic
81.
A programmer writes a loop that never ends while processing examination records. This is called:
A. Finite loop
B. Infinite loop
C. Nested loop
D. Recursive call
Answer: B
82.
An examination officer wants software to validate student IDs automatically before submission. Which programming concept is MOST relevant?
A. Input validation
B. Virtualization
C. Fragmentation
D. Routing
Answer: A
83.
A program crashes when invalid marks are entered. Which programming practice helps avoid this?
A. Exception handling
B. File formatting
C. Compression
D. Routing
Answer: A
84.
A software developer stores examination marks in an array. What is the MAIN advantage?
A. Stores mixed unrelated data only
B. Allows indexed access to multiple values
C. Eliminates memory use
D. Replaces databases
Answer: B
85.
An examination system calculates grades automatically based on marks ranges. Which programming structure is MOST suitable?
A. Sequence only
B. Decision structure
C. Infinite loop
D. Compilation
Answer: B
86.
A programmer wants reusable code for generating examination reports. Which concept is MOST appropriate?
A. Function/procedure
B. Fragmentation
C. Multiplexing
D. Encryption
Answer: A
87.
An examination system stores student objects with attributes such as name and registration number. Which paradigm is this?
A. Procedural programming
B. Object-oriented programming
C. Assembly programming
D. Machine language
Answer: B
88.
A programmer tests individual modules separately before combining them. This is:
A. Unit testing
B. Integration testing
C. Acceptance testing
D. Beta testing
Answer: A
89.
An examination portal displays an error because variables were declared incorrectly. Which stage would MOST likely detect this?
A. Compilation
B. Routing
C. Transmission
D. Scheduling
Answer: A
90.
An institution wants examination software to work on different operating systems. Which approach is BEST?
A. Platform-dependent development only
B. Cross-platform development
C. Manual processing
D. Analog computing
Answer: B
Section J: Comprehensive Mixed Scenarios
91.
An examination officer receives complaints that online results are displayed very slowly. Monitoring shows excessive database queries. Which solution is BEST?
A. Increase paper usage
B. Optimize queries and indexes
C. Remove the database
D. Disable networking
Answer: B
92.
An institution wants automatic alerts when suspicious login attempts occur. Which technology is MOST suitable?
A. Intrusion detection system
B. Spreadsheet software
C. Printer drivers
D. File compression
Answer: A
93.
An examination database stores passwords in plain text. What is the BEST improvement?
A. Use password hashing
B. Print passwords
C. Share passwords openly
D. Store passwords in Word files
Answer: A
94.
An examination office migrates from paper-based records to digital systems. Which challenge is MOST likely during transition?
A. User resistance and training needs
B. Elimination of all risks
C. Reduced need for policies
D. Removal of all hardware
Answer: A
95.
A university stores examination data in the cloud and wants guaranteed uptime. Which agreement is MOST important?
A. Service Level Agreement (SLA)
B. Routing table
C. Source code license only
D. BIOS settings
Answer: A
96.
An examination officer notices that system logs show repeated failed login attempts from one IP address. What should be done FIRST?
A. Ignore the logs
B. Block or investigate the suspicious IP
C. Delete all user accounts
D. Shut down all computers permanently
Answer: B
97.
A university examination system allows students to recover forgotten passwords through email verification. Which security concept is being applied?
A. Authentication recovery
B. Data redundancy
C. Multiplexing
D. Defragmentation
Answer: A
98.
An examination officer exports student results into PDF format before sharing. Why is PDF commonly preferred?
A. Easy modification by everyone
B. Consistent formatting across devices
C. Requires compilation
D. Removes security automatically
Answer: B
99.
An institution introduces automated backup schedules for examination data every night. Which security objective does this MOST support?
A. Availability
B. Routing
C. Compression
D. Fragmentation
Answer: A
100.
An examination officer is asked to design a secure and efficient examination management environment. Which combination is MOST appropriate?
A. Shared passwords and no backups
B. Encryption, role-based access, backups, and audit logs
C. Public Wi‑Fi with no authentication
D. Manual-only processing without verification
Answer: B
A. Coding
B. Testing
C. Requirement analysis
D. Maintenance
Answer: C
42. A software developer tests whether the examination system modules work correctly together. This is known as:
A. Unit testing
B. Integration testing
C. Acceptance testing
D. Regression testing
Answer: B
43. An examination system is implemented in phases instead of all at once to reduce risk. This strategy is:
A. Parallel implementation
B. Phased implementation
C. Direct changeover
D. Pilot rejection
Answer: B
44. A programmer updates the examination software to fix discovered bugs after deployment. This activity is:
A. Feasibility study
B. Maintenance
C. Analysis
D. Documentation
Answer: B
45. An institution evaluates whether a proposed examination system is affordable and practical. This study is called:
A. Feasibility study
B. Stress testing
C. Benchmarking
D. Reverse engineering
Answer: A
46. A flowchart is mainly used to:
A. Encrypt data
B. Illustrate program logic
C. Remove malware
D. Configure hardware
Answer: B
47. A system analyst creates diagrams showing interactions between users and the examination system. These are called:
A. Use case diagrams
B. Pie charts
C. Histograms
D. Topologies
Answer: A
48. An examination office wants software that can be modified freely by developers. Which type is MOST suitable?
A. Proprietary software
B. Open-source software
C. Commercial software
D. Trial software
Answer: B
49. The examination system fails after new updates are installed. Which testing type ensures existing functions still work?
A. Regression testing
B. Alpha testing
C. White-box testing
D. Black-box testing
Answer: A
50. A software team uses Agile methodology for examination system development. Which characteristic BEST describes Agile?
A. Rigid planning only
B. Continuous feedback and iteration
C. No testing required
D. One-time deployment
Answer: B
Section F: ICT Ethics and Professionalism
51.
An examination officer shares student results with unauthorized individuals. Which ethical principle is violated?
A. Accountability
B. Confidentiality
C. Accessibility
D. Transparency
Answer: B
52.
A staff member installs pirated software in the examination office. This practice violates:
A. Data mining policies
B. Intellectual property rights
C. Cloud computing rules
D. Multiprocessing principles
Answer: B
53.
An examination officer discovers errors in released results. What is the MOST professional action?
A. Ignore the errors
B. Correct and communicate transparently
C. Delete all records
D. Blame students
Answer: B
54.
Using another programmer’s code without permission is an example of:
A. Virtualization
B. Plagiarism
C. Authentication
D. Benchmarking
Answer: B
55.
An institution introduces policies requiring strong passwords. This mainly improves:
A. Physical security
B. Logical security
C. File compression
D. Device cooling
Answer: B
56.
A staff member intentionally alters marks for personal gain. This act is BEST described as:
A. Professionalism
B. Cyber ethics violation
C. Data normalization
D. Optimization
Answer: B
57.
An examination officer is required to maintain accurate records and be answerable for actions performed. This principle is:
A. Accountability
B. Redundancy
C. Fragmentation
D. Scalability
Answer: A
58.
An institution stores examination records according to legal requirements for future reference. This process is:
A. Archiving
B. Routing
C. Debugging
D. Defragmentation
Answer: A
59.
A candidate requests correction of wrongly entered biodata before certification. Which data quality attribute is MOST relevant?
A. Accuracy
B. Compression
C. Replication
D. Availability
Answer: A
60.
An examination office establishes disaster recovery procedures. The MAIN objective is to:
A. Increase downtime
B. Ensure business continuity
C. Reduce internet usage
D. Eliminate backups
Answer: B
Section G: Advanced Scenario-Based Questions
61.
An examination portal crashes during online exams because the server CPU reaches 100% usage. Which upgrade would MOST directly improve performance?
A. Increasing RAM only
B. Replacing monitors
C. Upgrading CPU resources
D. Installing speakers
Answer: C
62.
Students are unable to access examination results because DNS services are down. What is the MAIN role of DNS?
A. Encrypting data
B. Translating domain names into IP addresses
C. Compressing files
D. Allocating memory
Answer: B
63.
An institution wants examination data synchronized automatically between campuses. Which technology BEST supports this?
A. Replication
B. Formatting
C. Defragmentation
D. Virtual memory
Answer: A
64.
An online examination platform logs users out automatically after inactivity. This primarily improves:
A. Availability
B. Security
C. Compression
D. Scalability
Answer: B
65.
The examination office introduces two-factor authentication. Which combination BEST represents this?
A. Username and username
B. Password and PIN
C. Password and fingerprint
D. Email and username
Answer: C
66.
A database administrator splits one large examination table into smaller related tables. Which process is this?
A. Redundancy
B. Normalization
C. Compilation
D. Encryption
Answer: B
67.
An institution needs to ensure examination data remains unchanged during transmission. Which technique BEST supports this?
A. Hashing
B. Formatting
C. Compression
D. Fragmentation
Answer: A
68.
A candidate submits online examination answers, but the internet disconnects before submission confirmation. Which database property ensures incomplete transactions are not saved?
A. Atomicity
B. Scalability
C. Virtualization
D. Multiplexing
Answer: A
69.
A university plans to store huge examination archives for many years at low cost. Which storage solution is MOST suitable?
A. Cache memory
B. Magnetic tape/cloud archival storage
C. CPU registers
D. ROM chips
Answer: B
70.
An examination officer needs graphical summaries of student performance trends. Which software category is MOST suitable?
A. Spreadsheet software
B. Antivirus software
C. Compiler software
D. Operating systems
Answer: A
Section H: Data Communication and Internet Technologies
71.
A university uses Wi‑Fi for examination office communication. Wi‑Fi is an example of:
A. Wired network
B. Wireless network
C. Optical storage
D. Parallel processing
Answer: B
72.
An examination officer sends confidential reports using email attachments protected by passwords. This mainly supports:
A. Data confidentiality
B. Data redundancy
C. Device management
D. Load balancing
Answer: A
73.
Which topology has a central device connecting all computers in the examination office?
A. Ring topology
B. Bus topology
C. Star topology
D. Mesh topology
Answer: C
74.
An institution experiences packet loss during online examinations. Which network issue is MOST likely responsible?
A. Low latency
B. Congestion
C. Authentication
D. Compression
Answer: B
75.
The examination department uses VPN technology for remote access. The MAIN advantage is:
A. Reduced security
B. Secure remote communication
C. Eliminating internet use
D. Faster typing speed
Answer: B
76.
An examination officer notices duplicate IP addresses causing communication failure. Which service can automatically assign unique IP addresses?
A. DNS
B. DHCP
C. FTP
D. SMTP
Answer: B
77.
A student accesses the examination portal using a smartphone. Which technology enables responsive display on mobile devices?
A. Responsive web design
B. Multiprocessing
C. Defragmentation
D. Normalization
Answer: A
78.
An institution uses video conferencing for remote viva examinations. Which network requirement is MOST critical?
A. High bandwidth
B. Low storage
C. Weak authentication
D. Reduced RAM
Answer: A
79.
An examination office experiences unauthorized wireless access. Which action BEST improves Wi‑Fi security?
A. Disable passwords
B. Enable WPA2/WPA3 encryption
C. Increase monitor size
D. Share credentials publicly
Answer: B
80.
The examination office website becomes inaccessible because its domain registration expired. Which service was MOST affected?
A. Hosting
B. Domain name registration
C. Routing
D. Indexing
Answer: B
Section I: Programming and Logic
81.
A programmer writes a loop that never ends while processing examination records. This is called:
A. Finite loop
B. Infinite loop
C. Nested loop
D. Recursive call
Answer: B
82.
An examination officer wants software to validate student IDs automatically before submission. Which programming concept is MOST relevant?
A. Input validation
B. Virtualization
C. Fragmentation
D. Routing
Answer: A
83.
A program crashes when invalid marks are entered. Which programming practice helps avoid this?
A. Exception handling
B. File formatting
C. Compression
D. Routing
Answer: A
84.
A software developer stores examination marks in an array. What is the MAIN advantage?
A. Stores mixed unrelated data only
B. Allows indexed access to multiple values
C. Eliminates memory use
D. Replaces databases
Answer: B
85.
An examination system calculates grades automatically based on marks ranges. Which programming structure is MOST suitable?
A. Sequence only
B. Decision structure
C. Infinite loop
D. Compilation
Answer: B
86.
A programmer wants reusable code for generating examination reports. Which concept is MOST appropriate?
A. Function/procedure
B. Fragmentation
C. Multiplexing
D. Encryption
Answer: A
87.
An examination system stores student objects with attributes such as name and registration number. Which paradigm is this?
A. Procedural programming
B. Object-oriented programming
C. Assembly programming
D. Machine language
Answer: B
88.
A programmer tests individual modules separately before combining them. This is:
A. Unit testing
B. Integration testing
C. Acceptance testing
D. Beta testing
Answer: A
89.
An examination portal displays an error because variables were declared incorrectly. Which stage would MOST likely detect this?
A. Compilation
B. Routing
C. Transmission
D. Scheduling
Answer: A
90.
An institution wants examination software to work on different operating systems. Which approach is BEST?
A. Platform-dependent development only
B. Cross-platform development
C. Manual processing
D. Analog computing
Answer: B
Section J: Comprehensive Mixed Scenarios
91.
An examination officer receives complaints that online results are displayed very slowly. Monitoring shows excessive database queries. Which solution is BEST?
A. Increase paper usage
B. Optimize queries and indexes
C. Remove the database
D. Disable networking
Answer: B
92.
An institution wants automatic alerts when suspicious login attempts occur. Which technology is MOST suitable?
A. Intrusion detection system
B. Spreadsheet software
C. Printer drivers
D. File compression
Answer: A
93.
An examination database stores passwords in plain text. What is the BEST improvement?
A. Use password hashing
B. Print passwords
C. Share passwords openly
D. Store passwords in Word files
Answer: A
94.
An examination office migrates from paper-based records to digital systems. Which challenge is MOST likely during transition?
A. User resistance and training needs
B. Elimination of all risks
C. Reduced need for policies
D. Removal of all hardware
Answer: A
95.
A university stores examination data in the cloud and wants guaranteed uptime. Which agreement is MOST important?
A. Service Level Agreement (SLA)
B. Routing table
C. Source code license only
D. BIOS settings
Answer: A
96.
An examination officer notices that system logs show repeated failed login attempts from one IP address. What should be done FIRST?
A. Ignore the logs
B. Block or investigate the suspicious IP
C. Delete all user accounts
D. Shut down all computers permanently
Answer: B
97.
A university examination system allows students to recover forgotten passwords through email verification. Which security concept is being applied?
A. Authentication recovery
B. Data redundancy
C. Multiplexing
D. Defragmentation
Answer: A
98.
An examination officer exports student results into PDF format before sharing. Why is PDF commonly preferred?
A. Easy modification by everyone
B. Consistent formatting across devices
C. Requires compilation
D. Removes security automatically
Answer: B
99.
An institution introduces automated backup schedules for examination data every night. Which security objective does this MOST support?
A. Availability
B. Routing
C. Compression
D. Fragmentation
Answer: A
100.
An examination officer is asked to design a secure and efficient examination management environment. Which combination is MOST appropriate?
A. Shared passwords and no backups
B. Encryption, role-based access, backups, and audit logs
C. Public Wi‑Fi with no authentication
D. Manual-only processing without verification
Answer: B
Tuesday, May 12, 2026
70+ BUSINESS ANALYST QUESTIONS AND ANSWERS
✅ Section 1: Fundamentals of
Business Analytics (1–15)
- What
is the main objective of Business Analytics?
A. Data storage
B. Data visualization only
C. Data-driven decision making
D. Database management
✅ Answer: C - Which
of the following is NOT a type of analytics?
A. Descriptive
B. Predictive
C. Prescriptive
D. Curative
✅ Answer: D - Which
analytics type answers “What happened?”
A. Descriptive
B. Predictive
C. Diagnostic
D. Prescriptive
✅ Answer: A - Which
analytics type focuses on future trends?
A. Descriptive
B. Predictive
C. Diagnostic
D. Cognitive
✅ Answer: B - Which
of the following is a Business Intelligence tool?
A. MySQL
B. Python
C. Power BI
D. GitHub
✅ Answer: C - KPI
stands for:
A. Key Performance Indicator
B. Knowledge Performance Index
C. Key Processing Indicator
D. Known Performance Input
✅ Answer: A - Which
of the following is a structured data format?
A. Image
B. PDF
C. SQL table
D. Video
✅ Answer: C - Dashboards
in analytics are used for:
A. Writing reports
B. Managing code
C. Visualizing KPIs
D. Testing APIs
✅ Answer: C
- What
is the first step in business analytics?
A. Build the model
B. Data interpretation
C. Problem definition
D. Deployment
✅ Answer: C - SWOT
analysis helps in:
A. Data storage
B. Statistical modeling
C. Strategic decision-making
D. Time series forecasting
✅ Answer: C - Which
software is commonly used for Business Analytics?
A. AutoCAD
B. SAP
C. PowerPoint
D. Tally
✅ Answer: B - Which
type of analytics provides “what-if” analysis?
A. Descriptive
B. Predictive
C. Diagnostic
D. Prescriptive
✅ Answer: D - ETL
stands for:
A. Evaluate, Test, Launch
B. Extract, Transform, Load
C. Execute, Transfer, Link
D. Explore, Transfer, Learn
✅ Answer: B - Which
of these is a data visualization library in Python?
A. Matplotlib
B. NumPy
C. Pandas
D. Scikit-learn
✅ Answer: A - An
outlier in business data refers to:
A. A missed observation
B. An error in system
C. A data point that deviates significantly from others
D. An average value
✅ Answer: C
✅ Section 2: Statistical Tools
& Techniques (16–30)
- Which
of the following measures central tendency?
A. Mean
B. Variance
C. Standard deviation
D. Correlation
✅ Answer: A - The
probability of an impossible event is:
A. 0
B. 1
C. 100
D. Undefined
✅ Answer: A - What
does the p-value in hypothesis testing indicate?
A. Model accuracy
B. Likelihood of null being true
C. Significance of results
D. R-squared
✅ Answer: C - Which
statistical test compares means of two groups?
A. Chi-square test
B. ANOVA
C. T-test
D. Z-test
✅ Answer: C - Standard
deviation measures:
A. Central value
B. Data correlation
C. Spread or dispersion of data
D. Linearity
✅ Answer: C - Which
graph is best for categorical data?
A. Line graph
B. Histogram
C. Bar chart
D. Scatter plot
✅ Answer: C - Which
chart shows data distribution over intervals?
A. Histogram
B. Pie chart
C. Bar graph
D. Line chart
✅ Answer: A - Correlation
ranges from:
A. 0 to 1
B. -1 to 1
C. -100 to +100
D. 0 to infinity
✅ Answer: B - What
does R-squared indicate?
A. Correlation strength
B. Model fit to data
C. Significance level
D. Prediction error
✅ Answer: B
- Which
distribution is bell-shaped and symmetric?
A. Normal
B. Binomial
C. Uniform
D. Exponential
✅ Answer: A - In
a right-skewed distribution, the mean is:
A. Greater than median
B. Equal to median
C. Less than median
D. Undefined
✅ Answer: A - What
is a population in statistics?
A. Sample subset
B. Data file
C. Entire group being studied
D. Filtered records
✅ Answer: C - Which
test is used for categorical variable relationships?
A. Z-test
B. T-test
C. Chi-square test
D. ANOVA
✅ Answer: C - Which
method is used for forecasting trend data?
A. Time Series
B. Regression
C. Classification
D. Clustering
✅ Answer: A - Which
statistic shows relationship strength between two variables?
A. Variance
B. Mean
C. Correlation
D. Skewness
✅ Answer: C
✅ Section 3: Predictive Modeling
& Forecasting (31–45)
- Which
technique is best for predicting numerical values?
A. Classification
B. Regression
C. Clustering
D. Association
✅ Answer: B - Which
model type is used for customer segmentation?
A. Regression
B. Clustering
C. Classification
D. Neural networks
✅ Answer: B - Decision
trees are mainly used for:
A. Forecasting time
B. Descriptive statistics
C. Classification and regression
D. Dashboards
✅ Answer: C - Which
of the following is a supervised learning algorithm?
A. K-means
B. Apriori
C. Decision Tree
D. PCA
✅ Answer: C - Which
model helps predict binary outcomes (yes/no)?
A. Linear regression
B. Logistic regression
C. Decision trees
D. KNN
✅ Answer: B - Overfitting
occurs when a model:
A. Generalizes well
B. Is too simple
C. Fits training data too closely
D. Uses fewer features
✅ Answer: C - Which
evaluation metric is best for classification models?
A. MAE
B. RMSE
C. Accuracy
D. R-squared
✅ Answer: C - Which
algorithm is not used for classification?
A. Logistic Regression
B. Random Forest
C. K-means
D. Naïve Bayes
✅ Answer: C - Which
technique is used to reduce dimensionality?
A. Clustering
B. PCA
C. Regression
D. Decision Tree
✅ Answer: B - Which
of the following is a time-series forecasting model?
A. ARIMA
B. Naïve Bayes
C. Decision Tree
D. SVM
✅ Answer: A - Which
metric is used to evaluate regression models?
A. Precision
B. Recall
C. RMSE
D. Confusion Matrix
✅ Answer: C - Which
of these is not a machine learning model?
A. Linear Regression
B. K-means
C. SWOT
D. Decision Tree
✅ Answer: C - Which
algorithm is suitable for anomaly detection?
A. Clustering
B. Linear regression
C. Logistic regression
D. PCA
✅ Answer: A - What
is the role of a confusion matrix?
A. Identify model bias
B. Evaluate classification performance
C. Visualize trends
D. Perform clustering
✅ Answer: B - Precision
is defined as:
A. TP / (TP + FP)
B. TP / (TP + FN)
C. TN / (TN + FP)
D. TP / (TP + TN)
✅ Answer: A
✅ Section 4: Decision-Making
& Case-Based Reasoning (46–60)
- What
is a decision support system (DSS)?
A. A website
B. A server-based application
C. A system that supports business decision-making
D. A reporting tool
✅ Answer: C - Which
model helps in portfolio risk analysis?
A. Regression
B. Monte Carlo simulation
C. Clustering
D. PCA
✅ Answer: B - Business
rules in analytics are often derived from:
A. Dashboards
B. Data mining
C. SQL queries
D. Data cleaning
✅ Answer: B - Case-based
reasoning involves:
A. Guessing past decisions
B. Automating model building
C. Reusing past solutions for new problems
D. Cleaning data
✅ Answer: C
- Which
technique helps visualize cause-and-effect relationships?
A. Histograms
B. Fishbone diagram
C. Pie charts
D. Line graphs
✅ Answer: B - Which
framework helps prioritize business initiatives?
A. RACI
B. Eisenhower Matrix
C. BCG Matrix
D. SWOT
✅ Answer: C - Which
metric evaluates customer lifetime value?
A. CLV
B. NPV
C. CAGR
D. ROI
✅ Answer: A - Which
concept helps measure customer satisfaction?
A. KPI
B. CLV
C. NPS
D. LTV
✅ Answer: C - Net
Present Value (NPV) is used for:
A. Cost tracking
B. Long-term profitability analysis
C. Short-term cash forecasting
D. Customer segmentation
✅ Answer: B - Which
technique is used for decision optimization?
A. Regression
B. Linear programming
C. Classification
D. Logistic regression
✅ Answer: B - Which
of the following measures project efficiency?
A. Payback period
B. Lead conversion
C. Net Promoter Score
D. Funnel ratio
✅ Answer: A - What
does the Pareto principle suggest?
A. 80% of effects come from 20% of causes
B. 50% effort gives 50% output
C. Balanced analysis gives perfect results
D. Random behavior produces consistent patterns
✅ Answer: A - KPI
dashboards are commonly used by:
A. Developers
B. Sales and Marketing teams
C. Database admins
D. Network engineers
✅ Answer: B - Which
method helps understand root cause of problems?
A. 5 Whys
B. Decision Tree
C. Pie chart
D. PCA
✅ Answer: A - Balanced
Scorecard is a tool for:
A. Machine learning
B. Web analytics
C. Strategic management
D. Code optimization
✅ Answer: C
✅ Section 5: Real-World
Applications & Tools (61–75)
- CRM
analytics helps in analyzing:
A. Finance
B. Supply chain
C. Customer behavior
D. HR records
✅ Answer: C - Which
platform offers drag-and-drop dashboard design?
A. Excel
B. Python
C. Tableau
D. Hadoop
✅ Answer: C - What
does OLAP stand for?
A. Online Analytical Processing
B. Offline Analytics Performance
C. Online Application Layer
D. Operational Learning AI Program
✅ Answer: A - Which
language is widely used in business analytics scripting?
A. HTML
B. Java
C. R
D. C++
✅ Answer: C - Which
tool is most commonly used for SQL-based analytics?
A. Python
B. PostgreSQL
C. Tableau
D. Excel
✅ Answer: B - Which
company uses analytics for personalized shopping recommendations?
A. FedEx
B. Netflix
C. Google Maps
D. GitHub
✅ Answer: B - Which
method is used in A/B testing?
A. Experimental design
B. Regression
C. Classification
D. Forecasting
✅ Answer: A - Which
industry uses churn prediction extensively?
A. Agriculture
B. Telecom
C. Manufacturing
D. Mining
✅ Answer: B - What
is data wrangling?
A. Storing large data
B. Cleaning and preparing raw data
C. Compressing big data
D. Querying JSON files
✅ Answer: B - A
Sankey diagram is used to show:
A. Circular flows
B. Resource distribution
C. Flow of data/values between nodes
D. Time trends
✅ Answer: C - Which
of these is NOT a benefit of business analytics?
A. Cost efficiency
B. Random sampling
C. Better decision making
D. Risk mitigation
✅ Answer: B - Which
concept applies analytics to operations?
A. Data warehousing
B. Operational analytics
C. Neural networks
D. Image processing
✅ Answer: B - Which
metric shows how many leads convert to customers?
A. ROI
B. CLV
C. Conversion rate
D. Retention score
✅ Answer: C - Which
technology supports real-time analytics?
A. Hadoop
B. Spark
C. Tableau
D. Excel
✅ Answer: B - Which
of the following platforms integrates dashboards and BI in the cloud?
A. Amazon EC2
B. Azure Synapse
C. Power BI
D. Notepad++
✅ Answer: C


