Advertise here ✔️

Phone: +255 692 127 931 Email: njoholes@gmail.com

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG5GSwn5UBLXuOOUyUDGcmuQRzn3NFkRk47bJzhk44ktBL7H0hlgUZOHqp4Y7HVlkKJd3MToAGxkygkNoG4t4kxCfjG9pCINqkA3KhHIDeudh4Sv1rRQ9uYAQJLrlxGWYzQWUGD9d8Za8/s930/3.png

Saleh Njohole

Always be inspired in your life.

My Life

What goes around is what comes around.

Brave

Be happy this moment because this moment is your life.

Tuesday, May 12, 2026

70+ BUSINESS ANALYST QUESTIONS AND ANSWERS

 


Section 1: Fundamentals of Business Analytics (1–15)

  1. What is the main objective of Business Analytics?
    A. Data storage
    B. Data visualization only
    C. Data-driven decision making
    D. Database management
     Answer: C
  2. Which of the following is NOT a type of analytics?
    A. Descriptive
    B. Predictive
    C. Prescriptive
    D. Curative
     Answer: D
  3. Which analytics type answers “What happened?”
    A. Descriptive
    B. Predictive
    C. Diagnostic
    D. Prescriptive
     Answer: A
  4. Which analytics type focuses on future trends?
    A. Descriptive
    B. Predictive
    C. Diagnostic
    D. Cognitive
     Answer: B
  5. Which of the following is a Business Intelligence tool?
    A. MySQL
    B. Python
    C. Power BI
    D. GitHub
     Answer: C
  6. KPI stands for:
    A. Key Performance Indicator
    B. Knowledge Performance Index
    C. Key Processing Indicator
    D. Known Performance Input
     Answer: A
  7. Which of the following is a structured data format?
    A. Image
    B. PDF
    C. SQL table
    D. Video
     Answer: C
  8. Dashboards in analytics are used for:
    A. Writing reports
    B. Managing code
    C. Visualizing KPIs
    D. Testing APIs
     Answer: C
  1. What is the first step in business analytics?
    A. Build the model
    B. Data interpretation
    C. Problem definition
    D. Deployment
     Answer: C
  2. SWOT analysis helps in:
    A. Data storage
    B. Statistical modeling
    C. Strategic decision-making
    D. Time series forecasting
     Answer: C
  3. Which software is commonly used for Business Analytics?
    A. AutoCAD
    B. SAP
    C. PowerPoint
    D. Tally
     Answer: B
  4. Which type of analytics provides “what-if” analysis?
    A. Descriptive
    B. Predictive
    C. Diagnostic
    D. Prescriptive
     Answer: D
  5. ETL stands for:
    A. Evaluate, Test, Launch
    B. Extract, Transform, Load
    C. Execute, Transfer, Link
    D. Explore, Transfer, Learn
     Answer: B
  6. Which of these is a data visualization library in Python?
    A. Matplotlib
    B. NumPy
    C. Pandas
    D. Scikit-learn
     Answer: A
  7. An outlier in business data refers to:
    A. A missed observation
    B. An error in system
    C. A data point that deviates significantly from others
    D. An average value
     Answer: C

Section 2: Statistical Tools & Techniques (16–30)

  1. Which of the following measures central tendency?
    A. Mean
    B. Variance
    C. Standard deviation
    D. Correlation
     Answer: A
  2. The probability of an impossible event is:
    A. 0
    B. 1
    C. 100
    D. Undefined
     Answer: A
  3. What does the p-value in hypothesis testing indicate?
    A. Model accuracy
    B. Likelihood of null being true
    C. Significance of results
    D. R-squared
     Answer: C
  4. Which statistical test compares means of two groups?
    A. Chi-square test
    B. ANOVA
    C. T-test
    D. Z-test
     Answer: C
  5. Standard deviation measures:
    A. Central value
    B. Data correlation
    C. Spread or dispersion of data
    D. Linearity
     Answer: C
  6. Which graph is best for categorical data?
    A. Line graph
    B. Histogram
    C. Bar chart
    D. Scatter plot
     Answer: C
  7. Which chart shows data distribution over intervals?
    A. Histogram
    B. Pie chart
    C. Bar graph
    D. Line chart
     Answer: A
  8. Correlation ranges from:
    A. 0 to 1
    B. -1 to 1
    C. -100 to +100
    D. 0 to infinity
     Answer: B
  9. What does R-squared indicate?
    A. Correlation strength
    B. Model fit to data
    C. Significance level
    D. Prediction error
     Answer: B
  1. Which distribution is bell-shaped and symmetric?
    A. Normal
    B. Binomial
    C. Uniform
    D. Exponential
     Answer: A
  2. In a right-skewed distribution, the mean is:
    A. Greater than median
    B. Equal to median
    C. Less than median
    D. Undefined
     Answer: A
  3. What is a population in statistics?
    A. Sample subset
    B. Data file
    C. Entire group being studied
    D. Filtered records
     Answer: C
  4. Which test is used for categorical variable relationships?
    A. Z-test
    B. T-test
    C. Chi-square test
    D. ANOVA
     Answer: C
  5. Which method is used for forecasting trend data?
    A. Time Series
    B. Regression
    C. Classification
    D. Clustering
     Answer: A
  6. Which statistic shows relationship strength between two variables?
    A. Variance
    B. Mean
    C. Correlation
    D. Skewness
     Answer: C

 

Section 3: Predictive Modeling & Forecasting (31–45)

  1. Which technique is best for predicting numerical values?
    A. Classification
    B. Regression
    C. Clustering
    D. Association
     Answer: B
  2. Which model type is used for customer segmentation?
    A. Regression
    B. Clustering
    C. Classification
    D. Neural networks
     Answer: B
  3. Decision trees are mainly used for:
    A. Forecasting time
    B. Descriptive statistics
    C. Classification and regression
    D. Dashboards
     Answer: C
  4. Which of the following is a supervised learning algorithm?
    A. K-means
    B. Apriori
    C. Decision Tree
    D. PCA
     Answer: C
  5. Which model helps predict binary outcomes (yes/no)?
    A. Linear regression
    B. Logistic regression
    C. Decision trees
    D. KNN
     Answer: B
  6. Overfitting occurs when a model:
    A. Generalizes well
    B. Is too simple
    C. Fits training data too closely
    D. Uses fewer features
     Answer: C
  7. Which evaluation metric is best for classification models?
    A. MAE
    B. RMSE
    C. Accuracy
    D. R-squared
     Answer: C
  8. Which algorithm is not used for classification?
    A. Logistic Regression
    B. Random Forest
    C. K-means
    D. Naïve Bayes
     Answer: C
  9. Which technique is used to reduce dimensionality?
    A. Clustering
    B. PCA
    C. Regression
    D. Decision Tree
     Answer: B
  10. Which of the following is a time-series forecasting model?
    A. ARIMA
    B. Naïve Bayes
    C. Decision Tree
    D. SVM
     Answer: A
  11. Which metric is used to evaluate regression models?
    A. Precision
    B. Recall
    C. RMSE
    D. Confusion Matrix
     Answer: C
  12. Which of these is not a machine learning model?
    A. Linear Regression
    B. K-means
    C. SWOT
    D. Decision Tree
     Answer: C
  13. Which algorithm is suitable for anomaly detection?
    A. Clustering
    B. Linear regression
    C. Logistic regression
    D. PCA
     Answer: A
  14. What is the role of a confusion matrix?
    A. Identify model bias
    B. Evaluate classification performance
    C. Visualize trends
    D. Perform clustering
     Answer: B
  15. Precision is defined as:
    A. TP / (TP + FP)
    B. TP / (TP + FN)
    C. TN / (TN + FP)
    D. TP / (TP + TN)
     Answer: A

 

Section 4: Decision-Making & Case-Based Reasoning (46–60)

  1. What is a decision support system (DSS)?
    A. A website
    B. A server-based application
    C. A system that supports business decision-making
    D. A reporting tool
     Answer: C
  2. Which model helps in portfolio risk analysis?
    A. Regression
    B. Monte Carlo simulation
    C. Clustering
    D. PCA
     Answer: B
  3. Business rules in analytics are often derived from:
    A. Dashboards
    B. Data mining
    C. SQL queries
    D. Data cleaning
     Answer: B
  4. Case-based reasoning involves:
    A. Guessing past decisions
    B. Automating model building
    C. Reusing past solutions for new problems
    D. Cleaning data
     Answer: C
  1. Which technique helps visualize cause-and-effect relationships?
    A. Histograms
    B. Fishbone diagram
    C. Pie charts
    D. Line graphs
     Answer: B
  2. Which framework helps prioritize business initiatives?
    A. RACI
    B. Eisenhower Matrix
    C. BCG Matrix
    D. SWOT
     Answer: C
  3. Which metric evaluates customer lifetime value?
    A. CLV
    B. NPV
    C. CAGR
    D. ROI
     Answer: A
  4. Which concept helps measure customer satisfaction?
    A. KPI
    B. CLV
    C. NPS
    D. LTV
     Answer: C
  5. Net Present Value (NPV) is used for:
    A. Cost tracking
    B. Long-term profitability analysis
    C. Short-term cash forecasting
    D. Customer segmentation
     Answer: B
  6. Which technique is used for decision optimization?
    A. Regression
    B. Linear programming
    C. Classification
    D. Logistic regression
     Answer: B
  7. Which of the following measures project efficiency?
    A. Payback period
    B. Lead conversion
    C. Net Promoter Score
    D. Funnel ratio
     Answer: A
  8. What does the Pareto principle suggest?
    A. 80% of effects come from 20% of causes
    B. 50% effort gives 50% output
    C. Balanced analysis gives perfect results
    D. Random behavior produces consistent patterns
     Answer: A
  9. KPI dashboards are commonly used by:
    A. Developers
    B. Sales and Marketing teams
    C. Database admins
    D. Network engineers
     Answer: B
  10. Which method helps understand root cause of problems?
    A. 5 Whys
    B. Decision Tree
    C. Pie chart
    D. PCA
     Answer: A
  11. Balanced Scorecard is a tool for:
    A. Machine learning
    B. Web analytics
    C. Strategic management
    D. Code optimization
     Answer: C

 

Section 5: Real-World Applications & Tools (61–75)

  1. CRM analytics helps in analyzing:
    A. Finance
    B. Supply chain
    C. Customer behavior
    D. HR records
     Answer: C
  2. Which platform offers drag-and-drop dashboard design?
    A. Excel
    B. Python
    C. Tableau
    D. Hadoop
     Answer: C
  3. What does OLAP stand for?
    A. Online Analytical Processing
    B. Offline Analytics Performance
    C. Online Application Layer
    D. Operational Learning AI Program
     Answer: A
  4. Which language is widely used in business analytics scripting?
    A. HTML
    B. Java
    C. R
    D. C++
     Answer: C
  5. Which tool is most commonly used for SQL-based analytics?
    A. Python
    B. PostgreSQL
    C. Tableau
    D. Excel
     Answer: B
  6. Which company uses analytics for personalized shopping recommendations?
    A. FedEx
    B. Netflix
    C. Google Maps
    D. GitHub
     Answer: B
  7. Which method is used in A/B testing?
    A. Experimental design
    B. Regression
    C. Classification
    D. Forecasting
     Answer: A
  8. Which industry uses churn prediction extensively?
    A. Agriculture
    B. Telecom
    C. Manufacturing
    D. Mining
     Answer: B
  9. What is data wrangling?
    A. Storing large data
    B. Cleaning and preparing raw data
    C. Compressing big data
    D. Querying JSON files
     Answer: B
  10. A Sankey diagram is used to show:
    A. Circular flows
    B. Resource distribution
    C. Flow of data/values between nodes
    D. Time trends
     Answer: C
  11. Which of these is NOT a benefit of business analytics?
    A. Cost efficiency
    B. Random sampling
    C. Better decision making
    D. Risk mitigation
     Answer: B
  12. Which concept applies analytics to operations?
    A. Data warehousing
    B. Operational analytics
    C. Neural networks
    D. Image processing
     Answer: B
  13. Which metric shows how many leads convert to customers?
    A. ROI
    B. CLV
    C. Conversion rate
    D. Retention score
     Answer: C
  14. Which technology supports real-time analytics?
    A. Hadoop
    B. Spark
    C. Tableau
    D. Excel
     Answer: B
  15. Which of the following platforms integrates dashboards and BI in the cloud?
    A. Amazon EC2
    B. Azure Synapse
    C. Power BI
    D. Notepad++
     Answer: C

 

Share:

Sunday, May 3, 2026

SYSTEM ADMINISTRATOR MOCK INTERVIEW EXAM

 


System Administrator Mock Interview Exam 


1. Which IP address is private?
A. 8.8.8.8
B. 172.16.5.4
C. 1.1.1.1
D. 192.0.2.1

2.What is the default port for HTTPS?
A. 80
B. 21
C. 443
D. 25

3.Which OSI layer handles routing?
A. Data Link
B. Network
C. Session
D. Transport

4.What does the CIA triad stand for?
A. Control, Integrity, Access
B. Confidentiality, Integrity, Availability
C. Control, Inspection, Audit
D. Confidentiality, Inspection, Access

5.In Linux, which command adds a user?
A. adduser
B. usermod
C. useradd
D. newuser

6.A subnet mask of 255.255.255.0 corresponds to which CIDR?
A. /16
B. /24
C. /8
D. /32

7.Which protocol uses port 22?
A. FTP
B. SSH
C. Telnet
D. SMTP

8.What is the main principle of Zero Trust?
A. Trust internal users
B. Trust verified devices
C. Never trust, always verify
D. Trust network perimeter

9.Which command shows running processes in Linux?
A. ps
B. ls
C. cat
D. who

10.Which command schedules jobs?
A. at
B. cron
C. schedule
D. jobrun

11.You cannot SSH into a server. What should you check first?
A. CPU usage
B. SSH service status
C. Disk size
D. User password length

12.Which tool is used for configuration management?
A. Docker
B. Ansible
C. Git
D. Apache

13.Which file stores user account info?
A. /etc/group
B. /etc/passwd
C. /etc/shadow
D. /etc/users

14.What does chmod 755 do?
A. Full access for all
B. Owner full, others read/execute
C. Read only
D. No access

15.Which port does DNS use?
A. 80
B. 53
C. 22
D. 25

16.Which command checks disk usage?
A. df
B. du
C. disk
D. usage

17.Which tool monitors system performance in real time?
A. ls
B. top
C. pwd
D. cat

18.A server is slow. What should you check first?
A. Background image
B. CPU, RAM, Disk
C. Username
D. IP address

19.Which protocol is connection-oriented?
A. UDP
B. TCP
C. ICMP
D. ARP

20.Which command installs packages in Ubuntu?
A. yum install
B. apt install
C. install pkg
D. dpkg start

21.What is the purpose of a firewall?
A. Encrypt data
B. Monitor CPU
C. Filter network traffic
D. Manage users

22.Which command creates a group?
A. addgroup
B. groupadd
C. newgroup
D. creategroup

23.Which Linux directory stores logs?
A. /home
B. /var/log
C. /etc/log
D. /logs

24.Which backup type copies only changed data since last backup?
A. Full
B. Incremental
C. Differential
D. Snapshot

25.What does ping test?
A. Disk
B. Connectivity
C. CPU
D. Memory


26.
Which command restarts a service?
A. service restart
B. systemctl restart
C. restart svc
D. reboot service

27.Which Kubernetes component schedules pods?
A. kubelet
B. scheduler
C. controller
D. proxy

28.What is least privilege?
A. Full access for admins
B. Minimum access required
C. Shared accounts
D. Guest access

29.Which command shows IP address?
A. ip a
B. ipconfig
C. netstat
D. route

30.Which tool is used for log analysis?
A. Splunk
B. Docker
C. Jenkins
D. Nginx

31.Which command checks open ports?
A. netstat -tuln
B. lsports
C. show ports
D. portlist

32.Which OSI layer handles encryption?
A. Application
B. Presentation
C. Network
D. Physical

33.A disk is full. What command helps find large files?
A. find / -size +100M
B. ls big
C. diskcheck
D. scan

34.What is RAID 1?
A. Striping
B. Mirroring
C. Parity
D. Backup

35.Which command changes file ownership?
A. chmod
B. chown
C. changeuser
D. ownfile

36.Which port is used by FTP?
A. 21
B. 22
C. 80
D. 110

37.Which tool visualizes metrics?
A. Grafana
B. Apache
C. Bash
D. Vim

38.What does systemctl do?
A. File editing
B. Service management
C. Networking
D. Disk management

39.Which command backs up files?
A. cp
B. rsync
C. mv
D. rm

40.Which type of attack floods a server?
A. Phishing
B. DoS
C. MITM
D. SQL Injection

41.Which file stores encrypted passwords?
A. /etc/passwd
B. /etc/shadow
C. /etc/security
D. /etc/auth

42.Which command edits crontab?
A. cronedit
B. crontab -e
C. editcron
D. jobedit

43.What is Kubernetes used for?
A. Database
B. Container orchestration
C. Firewall
D. Backup

44.Which protocol resolves IP to MAC?
A. DNS
B. ARP
C. TCP
D. HTTP

45.Which compliance framework is international?
A. NIST
B. ISO 27001
C. GDPR
D. Local Act

46.A user cannot access a file. What do you check first?
A. CPU
B. Permissions
C. Disk
D. Network

47.Which command shows memory usage?
A. free -m
B. memcheck
C. topmem
D. showmem

48.Which command tests DNS resolution?
A. nslookup
B. ping
C. route
D. netstat

49.Which is a secure authentication method?
A. Password only
B. MFA
C. Shared login
D. Plain text

50.Database backup in Linux commonly uses:
A. mysqldump
B. dbcopy
C. sqlsave
D. backupdb


 Answer.

1. B — 172.16.5.4
Private IP ranges include 172.16.0.0 – 172.31.255.255, so this falls within that range.

2. C — 443
HTTPS uses port 443 for secure encrypted communication (SSL/TLS).

3. B — Network
The Network layer (Layer 3) is responsible for routing packets between networks.

4. B — Confidentiality, Integrity, Availability
These are the three core principles of information security.

5. C — useradd
useradd is the standard low-level command for creating users in Linux.

6. B — /24
255.255.255.0 corresponds to 24 bits for network, hence /24.

7. B — SSH
SSH (Secure Shell) uses port 22 for secure remote access.

8. C — Never trust, always verify
Zero Trust assumes no user/device is trusted by default, even inside the network.

9. A — ps
ps displays running processes. Example: ps aux.

10. B — cron
cron schedules recurring jobs, while at is for one-time tasks.

11. B — SSH service status
First step: check if SSH daemon is running:
systemctl status sshd

12. B — Ansible
Ansible is widely used for automation and configuration management.

13. B — /etc/passwd
Stores user account details (not passwords). Password hashes are in /etc/shadow.

14. B — Owner full, others read/execute
755 =

Owner: rwx (7)
Group: r-x (5)
Others: r-x (5)

15. B — 53
DNS uses port 53 (UDP primarily, TCP for large queries).

16. A — df
df -h shows disk space usage per filesystem.

17. B — top
top shows real-time CPU, memory, and process activity.

18. B — CPU, RAM, Disk
These are primary performance bottlenecks to check first.

19. B — TCP
TCP is connection-oriented (reliable), unlike UDP.

20. B — apt install
Ubuntu/Debian use apt install for package management.

21. C — Filter network traffic
Firewalls allow/deny traffic based on rules.

22. B — groupadd
Creates new groups in Linux.

23. B — /var/log
System logs (auth, syslog, kernel logs) are stored here.

24. B — Incremental
Backs up only changes since last backup (efficient storage).

25. B — Connectivity
ping checks if a host is reachable over network.

26. B — systemctl restart
Used in modern Linux (systemd systems).

27. B — scheduler
Kubernetes scheduler assigns pods to nodes.

28. B — Minimum access required
Principle of least privilege reduces security risk.

29. A — ip a
Modern command to display IP addresses.

30. A — Splunk
Splunk is used for log analysis and SIEM.

31. A — netstat -tuln
Shows listening ports and services.

32. B — Presentation
Handles encryption, compression, data formatting.

33. A — find / -size +100M
Finds files larger than 100MB.

34. B — Mirroring
RAID 1 duplicates data across disks for redundancy.

35. B — chown
Changes file ownership.

36. A — 21
FTP control channel uses port 21.

37. A — Grafana
Grafana visualizes metrics (often with Prometheus).

38. B — Service management
systemctl manages services (start, stop, restart).

39. B — rsync
Efficient backup tool (incremental + remote sync).

40. B — DoS
Denial of Service overwhelms a system with traffic.

41. B — /etc/shadow
Stores hashed passwords securely.

42. B — crontab -e
Edits user cron jobs.

43. B — Container orchestration
Kubernetes manages containers at scale.

44. B — ARP
Maps IP addresses to MAC addresses.

45. B — ISO 27001
International standard for information security management.

46. B — Permissions
File access issues are usually permission-related.

47. A — free -m
Displays memory usage in MB.

48. A — nslookup
Used to query DNS servers.

49. B — MFA
Multi-Factor Authentication is more secure than passwords alone.

50. A — mysqldump
Common tool for MySQL database backups.

Share:

Wednesday, April 15, 2026

BUSINESS ANALYST - MOCK APTITUTE TEST (MAT)

Share:

200 + Business Analysis questions and answers

 



200 + Business Analysis questions and answers

1–20: Fundamentals of Business Analysis

  1. What is business analysis?
    A. Coding software
    B. Identifying business needs and solutions
    C. Marketing products
    D. Hiring staff
    Answer: B
  2. Who performs business analysis?
    A. Developer
    B. Tester
    C. Business Analyst
    D. Manager
    Answer: C
  3. What is a stakeholder?
    A. Programmer
    B. Person affected by project
    C. Accountant
    D. Designer
    Answer: B
  4. Requirement is:
    A. Code
    B. Documentation
    C. Need or condition
    D. Budget
    Answer: C
  5. Business requirement focuses on:
    A. IT systems
    B. Organization goals
    C. Coding
    D. Testing
    Answer: B
  6. Functional requirement describes:
    A. System behavior
    B. Budget
    C. Timeline
    D. Stakeholders
    Answer: A
  7. Non-functional requirement includes:
    A. Performance
    B. Login feature
    C. Payment feature
    D. Registration
    Answer: A
  8. BABOK stands for:
    A. Business Analysis Body of Knowledge
    B. Basic Analysis Book
    C. Business Accounting Book
    D. None
    Answer: A
  9. Agile focuses on:
    A. Documentation
    B. Flexibility
    C. Fixed scope
    D. No changes
    Answer: B
  10. Waterfall is:
    A. Iterative model
    B. Linear model
    C. Agile model
    D. Scrum
    Answer: B
  11. SWOT stands for:
    A. Strength, Weakness, Opportunity, Threat
    B. System Work Operation Test
    C. Software Work Optimization Tool
    D. None
    Answer: A
  12. PESTLE analysis includes:
    A. Political, Economic
    B. Social, Technological
    C. Legal, Environmental
    D. All
    Answer: D
  13. Gap analysis identifies:
    A. Budget
    B. Difference between current & future state
    C. Stakeholders
    D. Code errors
    Answer: B
  14. Use case diagram shows:
    A. Database
    B. Actors and interactions
    C. Budget
    D. Network
    Answer: B
  15. Business process model describes:
    A. Workflow
    B. Code
    C. Hardware
    D. Budget
    Answer: A
  16. KPI stands for:
    A. Key Performance Indicator
    B. Knowledge Process Index
    C. Key Product Input
    D. None
    Answer: A
  17. Risk is:
    A. Guaranteed failure
    B. Uncertain event
    C. Cost
    D. Profit
    Answer: B
  18. Feasibility study checks:
    A. Coding
    B. Viability
    C. Testing
    D. Deployment
    Answer: B
  19. Stakeholder analysis identifies:
    A. Risks
    B. People involved
    C. Budget
    D. Code
    Answer: B
  20. Solution assessment evaluates:
    A. Cost
    B. Performance
    C. Value
    D. All
    Answer: D

21–40: Requirements & Elicitation

  1. Elicitation means:
    A. Coding
    B. Gathering requirements
    C. Testing
    D. Deploying
    Answer: B
  2. Interview is:
    A. Testing technique
    B. Requirement gathering
    C. Coding
    D. Debugging
    Answer: B
  3. Workshop involves:
    A. Single person
    B. Group discussion
    C. Coding
    D. Testing
    Answer: B
  4. Observation is also called:
    A. Job shadowing
    B. Coding
    C. Testing
    D. Mapping
    Answer: A
  5. Questionnaire is:
    A. Interview
    B. Survey
    C. Testing
    D. Coding
    Answer: B
  6. Prototype is:
    A. Final system
    B. Early model
    C. Code
    D. Test
    Answer: B
  7. Requirement traceability ensures:
    A. Budget
    B. Tracking requirements
    C. Coding
    D. Testing
    Answer: B
  8. BRD stands for:
    A. Business Requirement Document
    B. Basic Report Data
    C. Business Resource Data
    D. None
    Answer: A
  9. SRS stands for:
    A. Software Requirement Specification
    B. System Resource Setup
    C. Software Report Sheet
    D. None
    Answer: A
  10. User stories are used in:
    A. Waterfall
    B. Agile
    C. Testing
    D. Design
    Answer: B
  11. Acceptance criteria defines:
    A. Code
    B. Conditions for success
    C. Testing
    D. Budget
    Answer: B
  12. MoSCoW prioritization means:
    A. Must, Should, Could, Won’t
    B. Model System Code Work
    C. More Software Coding Work
    D. None
    Answer: A
  13. Requirement validation ensures:
    A. Correctness
    B. Cost
    C. Code
    D. Testing
    Answer: A
  14. Requirement verification ensures:
    A. Built right
    B. Built product
    C. Testing
    D. Coding
    Answer: A
  15. Change request is:
    A. Bug
    B. Requirement modification
    C. Code
    D. Test
    Answer: B
  16. Scope creep means:
    A. Reduced scope
    B. Increased uncontrolled scope
    C. Budget
    D. Testing
    Answer: B
  17. UML stands for:
    A. Unified Modeling Language
    B. Universal Machine Logic
    C. User Model Language
    D. None
    Answer: A
  18. Activity diagram shows:
    A. Flow
    B. Database
    C. Budget
    D. Code
    Answer: A
  19. Sequence diagram shows:
    A. Interaction over time
    B. Database
    C. Budget
    D. Code
    Answer: A
  20. Data flow diagram shows:
    A. Data movement
    B. Code
    C. Budget
    D. Testing
    Answer: A

41–60: Tools & Techniques

  1. Excel is used for:
    A. Coding
    B. Analysis
    C. Testing
    D. Deployment
    Answer: B
  2. SQL is used for:
    A. Database queries
    B. Coding UI
    C. Testing
    D. Design
    Answer: A
  3. Power BI is used for:
    A. Coding
    B. Data visualization
    C. Testing
    D. Design
    Answer: B
  4. Jira is used for:
    A. Accounting
    B. Project tracking
    C. Coding
    D. Testing
    Answer: B
  5. Confluence is used for:
    A. Documentation
    B. Coding
    C. Testing
    D. Deployment
    Answer: A
  6. Wireframe is:
    A. Code
    B. Design layout
    C. Test
    D. Budget
    Answer: B
  7. Mockup is:
    A. Prototype
    B. Design
    C. Both
    D. None
    Answer: C
  8. Dashboard shows:
    A. Data summary
    B. Code
    C. Test
    D. Budget
    Answer: A
  9. Data model represents:
    A. Structure of data
    B. Code
    C. Test
    D. Budget
    Answer: A
  10. ER diagram shows:
    A. Entities and relationships
    B. Code
    C. Budget
    D. Testing
    Answer: A
  11. KPI dashboard tracks:
    A. Performance
    B. Code
    C. Testing
    D. Budget
    Answer: A
  12. Benchmarking compares:
    A. Competitors
    B. Code
    C. Budget
    D. Testing
    Answer: A
  13. Root cause analysis identifies:
    A. Problem source
    B. Code
    C. Test
    D. Budget
    Answer: A
  14. Fishbone diagram is used for:
    A. Root cause analysis
    B. Coding
    C. Testing
    D. Budget
    Answer: A
  15. Brainstorming generates:
    A. Ideas
    B. Code
    C. Test
    D. Budget
    Answer: A
  16. Decision tree helps:
    A. Decision making
    B. Coding
    C. Testing
    D. Budget
    Answer: A
  17. Cost-benefit analysis evaluates:
    A. Value vs cost
    B. Code
    C. Test
    D. Budget
    Answer: A
  18. ROI stands for:
    A. Return on Investment
    B. Risk of Input
    C. Rate of Interest
    D. None
    Answer: A
  19. Balanced scorecard measures:
    A. Performance
    B. Code
    C. Testing
    D. Budget
    Answer: A
  20. Data mining extracts:
    A. Patterns
    B. Code
    C. Testing
    D. Budget
    Answer: A

61–80: Agile & Scrum

  1. Scrum is:
    A. Framework
    B. Tool
    C. Language
    D. Software
    Answer: A
  2. Sprint is:
    A. Iteration
    B. Code
    C. Test
    D. Budget
    Answer: A
  3. Product backlog contains:
    A. Requirements
    B. Code
    C. Test
    D. Budget
    Answer: A
  4. Scrum master role:
    A. Facilitate team
    B. Code
    C. Test
    D. Budget
    Answer: A
  5. Product owner:
    A. Defines requirements
    B. Code
    C. Test
    D. Budget
    Answer: A
  6. Daily stand-up duration:
    A. 15 mins
    B. 1 hour
    C. 2 hours
    D. 30 mins
    Answer: A
  7. Sprint review is for:
    A. Demo
    B. Coding
    C. Testing
    D. Budget
    Answer: A
  8. Retrospective focuses on:
    A. Improvement
    B. Code
    C. Test
    D. Budget
    Answer: A
  9. Velocity measures:
    A. Work completed
    B. Code
    C. Test
    D. Budget
    Answer: A
  10. Burndown chart shows:
    A. Remaining work
    B. Code
    C. Test
    D. Budget
    Answer: A
  11. Agile manifesto values:
    A. Individuals
    B. Working software
    C. Customer collaboration
    D. All
    Answer: D
  12. Kanban uses:
    A. Board
    B. Code
    C. Test
    D. Budget
    Answer: A
  13. WIP means:
    A. Work in Progress
    B. Work Input
    C. Work Plan
    D. None
    Answer: A
  14. Epic is:
    A. Large user story
    B. Code
    C. Test
    D. Budget
    Answer: A
  15. Story points measure:
    A. Effort
    B. Code
    C. Test
    D. Budget
    Answer: A
  16. Backlog grooming means:
    A. Refinement
    B. Coding
    C. Testing
    D. Budget
    Answer: A
  17. Agile supports:
    A. Change
    B. Fixed scope
    C. No changes
    D. Budget
    Answer: A
  18. Increment means:
    A. Add value
    B. Code
    C. Test
    D. Budget
    Answer: A
  19. Iteration means:
    A. Repeat cycle
    B. Code
    C. Test
    D. Budget
    Answer: A
  20. Scrum artifacts include:
    A. Backlog
    B. Increment
    C. Sprint backlog
    D. All
    Answer: D

81–100: Advanced Concepts

  1. Business case justifies:
    A. Project
    B. Code
    C. Test
    D. Budget
    Answer: A
  2. Governance ensures:
    A. Control
    B. Code
    C. Test
    D. Budget
    Answer: A
  3. Data governance manages:
    A. Data quality
    B. Code
    C. Test
    D. Budget
    Answer: A
  4. Change management handles:
    A. Change
    B. Code
    C. Test
    D. Budget
    Answer: A
  5. Stakeholder engagement ensures:
    A. Involvement
    B. Code
    C. Test
    D. Budget
    Answer: A
  6. Business rules define:
    A. Constraints
    B. Code
    C. Test
    D. Budget
    Answer: A
  7. KPI vs metric:
    A. KPI is strategic
    B. Metric is general
    C. Both
    D. None
    Answer: C
  8. Data quality includes:
    A. Accuracy
    B. Completeness
    C. Consistency
    D. All
    Answer: D
  9. Process improvement aims:
    A. Efficiency
    B. Code
    C. Test
    D. Budget
    Answer: A
  10. Lean focuses on:
    A. Waste reduction
    B. Code
    C. Test
    D. Budget
    Answer: A
  11. Six Sigma aims:
    A. Quality improvement
    B. Code
    C. Test
    D. Budget
    Answer: A
  12. DMAIC stands for:
    A. Define, Measure, Analyze, Improve, Control
    B. Data Model Analysis
    C. Design Model
    D. None
    Answer: A
  13. Business intelligence uses:
    A. Data analysis
    B. Code
    C. Test
    D. Budget
    Answer: A
  14. Data warehouse stores:
    A. Historical data
    B. Code
    C. Test
    D. Budget
    Answer: A
  15. ETL means:
    A. Extract, Transform, Load
    B. Enter Test Load
    C. Execute Transfer Logic
    D. None
    Answer: A
  16. Predictive analysis forecasts:
    A. Future
    B. Code
    C. Test
    D. Budget
    Answer: A
  17. Descriptive analysis shows:
    A. Past data
    B. Code
    C. Test
    D. Budget
    Answer: A
  18. Prescriptive analysis suggests:
    A. Actions
    B. Code
    C. Test
    D. Budget
    Answer: A
  19. Data visualization improves:
    A. Understanding
    B. Code
    C. Test
    D. Budget
    Answer: A
  20. Business analyst primary goal:
    A. Deliver value
    B. Code
    C. Test
    D. Budget
    Answer: A

 

101–120: Requirements Management

  1. Requirement lifecycle includes:
    A. Elicitation
    B. Analysis
    C. Validation
    D. All
    Answer: D
  2. Requirement prioritization ensures:
    A. Important items first
    B. Coding
    C. Testing
    D. Budget
    Answer: A
  3. Version control manages:
    A. Requirement changes
    B. Code only
    C. Testing
    D. Budget
    Answer: A
  4. Baseline means:
    A. Approved version
    B. Code
    C. Test
    D. Budget
    Answer: A
  5. Requirement attributes include:
    A. Priority
    B. Status
    C. Owner
    D. All
    Answer: D
  6. Traceability matrix links:
    A. Requirements to tests
    B. Code
    C. Budget
    D. Design only
    Answer: A
  7. Change impact analysis evaluates:
    A. Effects of change
    B. Code
    C. Test
    D. Budget
    Answer: A
  8. Requirement conflict occurs when:
    A. Two needs clash
    B. Code
    C. Test
    D. Budget
    Answer: A
  9. Requirement approval is done by:
    A. Stakeholders
    B. Developers
    C. Testers
    D. Users only
    Answer: A
  10. Requirement repository stores:
    A. Requirements
    B. Code
    C. Test
    D. Budget
    Answer: A
  11. Requirement decomposition breaks:
    A. Large requirements
    B. Code
    C. Test
    D. Budget
    Answer: A
  12. SMART requirements are:
    A. Specific
    B. Measurable
    C. Achievable
    D. All
    Answer: D
  13. Requirement ambiguity means:
    A. Unclear requirement
    B. Code
    C. Test
    D. Budget
    Answer: A
  14. Requirement completeness ensures:
    A. All needs covered
    B. Code
    C. Test
    D. Budget
    Answer: A
  15. Requirement consistency ensures:
    A. No conflicts
    B. Code
    C. Test
    D. Budget
    Answer: A
  16. Requirement feasibility checks:
    A. Practicality
    B. Code
    C. Test
    D. Budget
    Answer: A
  17. Requirement validation is done by:
    A. Users
    B. Developers
    C. Testers
    D. Managers
    Answer: A
  18. Requirement documentation format includes:
    A. Text
    B. Models
    C. Diagrams
    D. All
    Answer: D
  19. Requirement risk is:
    A. Uncertainty in requirement
    B. Code
    C. Test
    D. Budget
    Answer: A
  20. Requirement sign-off means:
    A. Approval
    B. Code
    C. Test
    D. Budget
    Answer: A

121–140: Business Process & Modeling

  1. BPM stands for:
    A. Business Process Management
    B. Basic Project Model
    C. Business Program Model
    D. None
    Answer: A
  2. AS-IS model shows:
    A. Current state
    B. Future state
    C. Code
    D. Budget
    Answer: A
  3. TO-BE model shows:
    A. Future state
    B. Current
    C. Code
    D. Budget
    Answer: A
  4. Process mapping visualizes:
    A. Workflow
    B. Code
    C. Test
    D. Budget
    Answer: A
  5. Swimlane diagram shows:
    A. Roles
    B. Code
    C. Test
    D. Budget
    Answer: A
  6. Process automation reduces:
    A. Manual work
    B. Code
    C. Test
    D. Budget
    Answer: A
  7. Bottleneck is:
    A. Delay point
    B. Code
    C. Test
    D. Budget
    Answer: A
  8. Value stream mapping identifies:
    A. Value steps
    B. Code
    C. Test
    D. Budget
    Answer: A
  9. Reengineering means:
    A. Redesign process
    B. Code
    C. Test
    D. Budget
    Answer: A
  10. Process improvement uses:
    A. Analysis
    B. Code
    C. Test
    D. Budget
    Answer: A
  11. Business rules engine automates:
    A. Decisions
    B. Code
    C. Test
    D. Budget
    Answer: A
  12. Workflow diagram shows:
    A. Task sequence
    B. Code
    C. Test
    D. Budget
    Answer: A
  13. SIPOC includes:
    A. Supplier
    B. Input
    C. Process
    D. All
    Answer: D
  14. Process owner is:
    A. Responsible person
    B. Code
    C. Test
    D. Budget
    Answer: A
  15. Process KPI measures:
    A. Performance
    B. Code
    C. Test
    D. Budget
    Answer: A
  16. Standard operating procedure is:
    A. Document
    B. Code
    C. Test
    D. Budget
    Answer: A
  17. Process compliance ensures:
    A. Rules followed
    B. Code
    C. Test
    D. Budget
    Answer: A
  18. Process simulation tests:
    A. Model behavior
    B. Code
    C. Test
    D. Budget
    Answer: A
  19. Process dependency means:
    A. Interconnected steps
    B. Code
    C. Test
    D. Budget
    Answer: A
  20. Process cycle time measures:
    A. Duration
    B. Code
    C. Test
    D. Budget
    Answer: A

141–160: Data Analysis & BI

  1. Data analysis interprets:
    A. Data
    B. Code
    C. Test
    D. Budget
    Answer: A
  2. Data cleansing removes:
    A. Errors
    B. Code
    C. Test
    D. Budget
    Answer: A
  3. Data profiling examines:
    A. Data structure
    B. Code
    C. Test
    D. Budget
    Answer: A
  4. OLAP is used for:
    A. Analysis
    B. Coding
    C. Testing
    D. Budget
    Answer: A
  5. OLTP is used for:
    A. Transactions
    B. Analysis
    C. Test
    D. Budget
    Answer: A
  6. Fact table stores:
    A. Measures
    B. Code
    C. Test
    D. Budget
    Answer: A
  7. Dimension table stores:
    A. Attributes
    B. Code
    C. Test
    D. Budget
    Answer: A
  8. Star schema includes:
    A. Fact + dimension
    B. Code
    C. Test
    D. Budget
    Answer: A
  9. Snowflake schema is:
    A. Normalized star
    B. Code
    C. Test
    D. Budget
    Answer: A
  10. Data mart is:
    A. Subset of warehouse
    B. Code
    C. Test
    D. Budget
    Answer: A
  11. Big data refers to:
    A. Large datasets
    B. Code
    C. Test
    D. Budget
    Answer: A
  12. Hadoop is:
    A. Big data tool
    B. Code
    C. Test
    D. Budget
    Answer: A
  13. Machine learning uses:
    A. Data patterns
    B. Code
    C. Test
    D. Budget
    Answer: A
  14. Data visualization tools include:
    A. Power BI
    B. Tableau
    C. Excel
    D. All
    Answer: D
  15. Dashboard KPI shows:
    A. Performance
    B. Code
    C. Test
    D. Budget
    Answer: A
  16. Drill-down analysis shows:
    A. Detailed data
    B. Code
    C. Test
    D. Budget
    Answer: A
  17. Data aggregation combines:
    A. Data
    B. Code
    C. Test
    D. Budget
    Answer: A
  18. Correlation shows:
    A. Relationship
    B. Code
    C. Test
    D. Budget
    Answer: A
  19. Regression predicts:
    A. Outcome
    B. Code
    C. Test
    D. Budget
    Answer: A
  20. Data storytelling explains:
    A. Insights
    B. Code
    C. Test
    D. Budget
    Answer: A

161–180: Strategy & Business Value

  1. Business strategy defines:
    A. Direction
    B. Code
    C. Test
    D. Budget
    Answer: A
  2. Vision statement shows:
    A. Future goal
    B. Code
    C. Test
    D. Budget
    Answer: A
  3. Mission statement defines:
    A. Purpose
    B. Code
    C. Test
    D. Budget
    Answer: A
  4. Competitive advantage is:
    A. Unique strength
    B. Code
    C. Test
    D. Budget
    Answer: A
  5. Porter’s Five Forces analyzes:
    A. Competition
    B. Code
    C. Test
    D. Budget
    Answer: A
  6. Market analysis studies:
    A. Customers
    B. Code
    C. Test
    D. Budget
    Answer: A
  7. Value proposition defines:
    A. Benefit
    B. Code
    C. Test
    D. Budget
    Answer: A
  8. Business model shows:
    A. How value created
    B. Code
    C. Test
    D. Budget
    Answer: A
  9. ROI measures:
    A. Profitability
    B. Code
    C. Test
    D. Budget
    Answer: A
  10. Cost reduction improves:
    A. Profit
    B. Code
    C. Test
    D. Budget
    Answer: A
  11. Revenue stream is:
    A. Income source
    B. Code
    C. Test
    D. Budget
    Answer: A
  12. Customer segmentation groups:
    A. Customers
    B. Code
    C. Test
    D. Budget
    Answer: A
  13. Stakeholder value ensures:
    A. Satisfaction
    B. Code
    C. Test
    D. Budget
    Answer: A
  14. Innovation creates:
    A. New ideas
    B. Code
    C. Test
    D. Budget
    Answer: A
  15. Digital transformation uses:
    A. Technology
    B. Code
    C. Test
    D. Budget
    Answer: A
  16. Business agility supports:
    A. Change
    B. Code
    C. Test
    D. Budget
    Answer: A
  17. Strategic alignment ensures:
    A. Goals match
    B. Code
    C. Test
    D. Budget
    Answer: A
  18. Value chain shows:
    A. Activities
    B. Code
    C. Test
    D. Budget
    Answer: A
  19. Benchmarking improves:
    A. Performance
    B. Code
    C. Test
    D. Budget
    Answer: A
  20. Risk management reduces:
    A. Uncertainty
    B. Code
    C. Test
    D. Budget
    Answer: A

181–200: Advanced & Real-world BA

  1. Business continuity ensures:
    A. Operations continue
    B. Code
    C. Test
    D. Budget
    Answer: A
  2. Disaster recovery restores:
    A. Systems
    B. Code
    C. Test
    D. Budget
    Answer: A
  3. SLA defines:
    A. Service level
    B. Code
    C. Test
    D. Budget
    Answer: A
  4. KPI threshold defines:
    A. Limit
    B. Code
    C. Test
    D. Budget
    Answer: A
  5. Customer journey map shows:
    A. Experience
    B. Code
    C. Test
    D. Budget
    Answer: A
  6. Persona represents:
    A. User type
    B. Code
    C. Test
    D. Budget
    Answer: A
  7. UX design improves:
    A. Experience
    B. Code
    C. Test
    D. Budget
    Answer: A
  8. A/B testing compares:
    A. Two options
    B. Code
    C. Test
    D. Budget
    Answer: A
  9. Hypothesis testing validates:
    A. Assumptions
    B. Code
    C. Test
    D. Budget
    Answer: A
  10. Data ethics ensures:
    A. Responsible use
    B. Code
    C. Test
    D. Budget
    Answer: A
  11. Compliance follows:
    A. Regulations
    B. Code
    C. Test
    D. Budget
    Answer: A
  12. Audit checks:
    A. Accuracy
    B. Code
    C. Test
    D. Budget
    Answer: A
  13. Governance framework ensures:
    A. Control
    B. Code
    C. Test
    D. Budget
    Answer: A
  14. Business architecture defines:
    A. Structure
    B. Code
    C. Test
    D. Budget
    Answer: A
  15. Enterprise analysis evaluates:
    A. Needs
    B. Code
    C. Test
    D. Budget
    Answer: A
  16. Solution design creates:
    A. System
    B. Code
    C. Test
    D. Budget
    Answer: A
  17. Implementation phase delivers:
    A. Solution
    B. Code
    C. Test
    D. Budget
    Answer: A
  18. Post-implementation review checks:
    A. Success
    B. Code
    C. Test
    D. Budget
    Answer: A
  19. Continuous improvement ensures:
    A. Growth
    B. Code
    C. Test
    D. Budget
    Answer: A
  20. Business analysis ultimate goal:
    A. Deliver business value
    B. Code
    C. Test
    D. Budget
    Answer: A

 


Share:

Contact Us

SALEHE NJOHOLE P.O.BOX 2428, DAR ES SALAAM, TANZANIA EAST AFRIKA. Call: 0692 127 931