1) -------------- is one of the concept of MIS. a) Management b) Material c) Decision d) Mechanism 2) The role of the MIS in an organization can be compared to the role of ------------ in the body. a) head b) heart c) breathing d) None of the above 3) The MIS helps the ------------- management in goal setting, strategic planning and evolving the business plans and their implementation. a) low level b) middle level c) top level d) base level 4) DSS means -------------------------------- . a) Data Support System b) Decision synchronize System c) Demand support System d) Decision Support System 5) The person who ensures that systems are developed on time, within budget, and with acceptable quality is a -----------------------. a) project manager b) systems designer c) systems owner d) external system user 6) ---------------------- is the first step in system development life cycle. a) Designing b) Planning c) Analysis d) Implementation 7) Inbound logistics and outbound logistics are the activities of -------------------- model. a) force b) tactical c) value chain d) cost analysis 8) ESS is the short form of --------------------------------a) Executive Sharing System b) Executive Support System c) Extended Support System d) Executive shaping system. 9)The information of MIS comes from the -----------------. a) Internal source b) External source c)Both internal and external source d)None of the above 10) Marketing information systems is one of the –----------------- area of MIS. a) relational b) communicational c) logical d) functional 11) Decision making is a _______ activity. a) Cognitive b)Intuitive c) Systematic d) Analytic 12) Use of value-chain analysis to identify ------------- information systems. a) static b) strategic c) dynamic d) composite 13) Following is one of the competitive strategy for competing in marketplace. a) Relational b) Operational c) Product Differentiation d) Financial 14) –---------------covers the planning, control, and administration of the operations of a concern. a) Management b) Information c) System d) Transaction 15) The--------------------- are informed about the progress, achievements and shortfalls in the activity and the targets. a) logical Managers b) functional managers c) customers d) top level managers 16) The basic components of DSS is are ----------------. a) Database b) Model base c) DSS software system d) All of the above 17) GDSS means -------------------------------- . a) Group Decision Support System c) General Decision Support System b) Group Dedicated Support System d) Group Decision Service System 18) –---------- competitive strategy develop products & services which are different from what the competition offers. a)Cost Leadership b) Differentiation c) Cost Focus d) Tactical 19) -------------------- systems are developed in response to corporate business initiative and give competitive advantage to the organization. a) Operational information b) Decision information c) Strategic information 20) Following is one of the component of MIS. a) Management b) procedure c) outcome d) analysis 21) The back bone of any organization is ---------------------------a) Employee b) information c) management d) capital d) All 22) The information to an MIS comes from the ------------. a)Internal source b) External source c) Both internal and external source d) None of the above 23) Which of the following functions performs producing and delivering products and services? a) Manufacturing and Production c) Finance and Accounting b) Sales and Marketing d) Human Resources 24) Modelling and decision making are ------------------------ activities. a) business processes c) Information processing b) management d) None of the given options 25) An ---------------- is a stable ,formal social structure that takes resource from the environment and processes them to produce outputs. a) Organization b) Association c) Union d) None of these 26) ------------- are also called as standard operating procedure in an organization. a) Politics b) Routines c) Management d) Culture 27) --------------- refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choice to guide their behaviours. a) Laws b) Human rights c) Ethics d) Obligations 28) -------------- can take information about people from many disparate resources such as employee applications, telephone records, customer listing. a) NOVA b) NOSA c) NOPA d) NORA 29) In IT infrastructure consists of a set of --------------------------and software applications that are required to operate the entire enterprise a) Physical devices b) Logical devices c) Perceptual devices d) Virtual devices 30) ----------------- platforms include hardware, software and management services to support a firm’s website including web hosting services ,routers and or cabling and wireless equipments. a) Mainframe b) Internet c) Data management d) None of the these Chapter 1 Information Systems in Global Business Today 1 Which of the following statements is not true? -> Internet advertising is not as popular as it used to be. 2 When Thomas Friedman wrote that the world was now "flat" (2005), he meant that: -> The Internet and global communications had greatly reduced the economic and cultural advantages of developed countries. 3 Business firms invest heavily in information systems to achieve: -> All of the above. 4 Output that is returned to appropriate members of the organization to help them evaluate or correct the input stage is known as: -> Feedback. 5 Which of the following statements about business processes is not true? -> Business processes include only formal, written rules for accomplishing tasks and have been developed over a long period. 6 Every business has an information value chain in which: ->All of the above. 7 Which of the following is not an important managerial complementary asset? -> A management culture that is very structured. 8 Information systems are sociotechnical systems because: -> All of the above. 9 The contemporary approach to information systems that emphasizes mathematically based models to study information systems is the: -> Technical approach. 10 Which of the following statements about the behavioural approach is not true? -> This approach focuses on mathematical techniques for optimizing selected parameters within an organization. 11 Which of the following statements does not apply to business processes? -> Business processes always stand on their own 12 Which one of the following business processes is not part of the finance and accounting functional area? -> Enrolling employees in benefits plans 13 A very clear understanding of how a business works can be achieved by -> Analyzing the business processes 14 Reports on the organization's current performance are provided by the -> Management information system (MIS) Chapter 2: Information Systems, Organizations, and Strategy Q 1 Some of the changes that occur in business firms because of new information technology (IT) investments: A Cannot be foreseen. B Have results that meet expectations. C Have results that may not meet expectations. D All of the above. ANSWER D Q 2 Which of the following statements is not true? A In the technical view of the firm, people who work in organizations develop customary ways of working. B In the technical view of the firm, people gain attachments to relationships. C In the behavioural view of the firm, people who work in organizations develop customary ways of working. D In the technical view of the firm, people never gain attachments to relationships. ANSWER D Q 3 Organizational culture is a powerful unifying force that: A Restrains common understanding. B Restrains agreement on procedures and practices. C Restrains political conflict D All of the above. ANSWER C Q 4 Which of the following is not an approach that organizations traditionally used to reduce transaction costs? A Buying suppliers and distributors. B Growing larger. C Eliminating relationships with suppliers and distributors. D Reducing costs through vertical integration. ANSWER C Q 5 As transaction costs decrease: A A firm's size should grow. B The number of employees in the firm should grow. C The number of employees should shrink. D The firm should not consider outsourcing. ANSWER C Q 6 The firm is viewed as a "nexus of contracts" among self-interested individuals rather than a unified, profit-maximizing entity, according to A Transaction cost theory. B Value-added theory. C Agency theory. D Outsourcing theory. ANSWER C Q 7 According to Porter's competitive forces model: A New companies rarely enter the marketplace. B There is usually no substitute for a particular company's product or service. C Suppliers have no impact on a firm's profits. D A profitable company depends on its ability to attract and retain customers and charge them high prices. ANSWER D Q 8 Which of the following is not a generic strategy for competing? A Product differentiation. B Reduction of customer and supplier intimacy. C Focus on market niche. D Low-cost leadership. ANSWER B Q 9 Which of the following is an example of a core competency? A Being the world's best miniature parts designer B Being the best package delivery service. C Being the best thin-film manufacturer. D All of the above. ANSWER D Q 10 Which of the following is directly related to the question: "How is the company creating value to the customer?" A What is the structure of the industry in which the firm is located? B What are the business, firm, and industry value chains for this particular firm? C What are the direction and nature of change within the industry? D How is the industry using information technology? ANSWER B CHAPTER 3 Ethical and Social Issues in Information Systems Q 1 Which moral dimension of the information age involves cultural values and practices? A Information rights and obligations B Accountability and control C Property rights and obligations D Quality of life ANSWER D Q 2 Using computers to combine data from multiple sources and creating electronic dossiers of detailed information on individuals is called A nonobvious relationship awareness(NORA) B Profiling C due process D informed consent ANSWER B Q 3 Correlating relationships to find obscure hidden connections in disparate databases and other sources is called A nonobvious relationship awareness(NORA) B Profiling C due process D informed consent ANSWER A Q 4 A basic ethical concept that means mechanisms are in place to determine who took responsible action or who is responsible for certain actions is A Responsibility. B Liability. C Accountability D due process. ANSWER C Q 5 Most American and European privacy law is based on a regime called A fair information practices (FIP). B privacy rights of individuals. C safe harbor theories D opt-out models of informed consent. ANSWER A Q 6 Tiny files deposited on a computer hard drive when a user visits certain Web sites are called A Web bugs. B cookies C safe harbors D viruses ANSWER B Q 7 The ________ model of informed consent permits the collection of personal information until the consumer specifically requests that data not be collected. A safe harbor B platform for privacy preferences C Opt-out D Opt-in ANSWER D Q 8 An intellectual work product used for a business purpose is classified as a ________ provided it is not based on information in the public domain A copyright B patent C digital millennium copyright D trade secret ANSWER D Q 9 Which law protects creators of intellectual property for the life of the author plus an additional 70 years after the author's death? A Copyright B Trade secret C Patent D Digital Millennium copyright ANSWER A Q 10 Which law grants the owner an exclusive monopoly on the ideas behind an invention for 20 years? A Copyright B Trade secret C Patent D Digital Millennium copyright ANSWER C Q 11 The commission of acts involving a computer that may not be illegal but are considered unethical is known as A A computer crime. B information privacy violations C lack of accountability. D computer abuse ANSWER D Q 12 Which of the following is not a principal source of poor system performance? A Software bugs and errors B Government regulation C Hardware or facility failures D Poor input data quality ANSWER B Q 13 Which of the following makes it illegal to circumvent technology-based protections of copyrighted materials? A Freedom of Information Act of 1966 B E-Government Act of 2002 C World Intellectual Property Organization Treaty D Electronic Communications Privacy Act of 1986 ANSWER C Q 14 The single largest source of repetitive stress injuries is A computer monitors B computer keyboards. C computer mouse D Computer speakers. ANSWER B Q 15 The most common kind of computer-related repetitive stress injury is A computer vision syndrome B severe back pain C technostress D carpal tunnel syndrome (CTS). ANSWER D CHAPTER 5 Foundations of Business Intelligence: Databases and Information Management Q 1 Generalized categories of data on which we store and maintain information in a database is called a(n) A. B. C. D. primary key. foreign key. Entity Attribute ANSWER C Q 2 The most common type of database is A. B. C. D. Hierarchical Network. Oracle. Relational. ANSWER D Q 3 The technical term for records in a database is A. B. C. D. Tuple Primary key Foreign key Field ANSWER A Q 4 You use a ________ to clarify table relationships in a relational database. A. primary key B. foreign key C. entity-relationship diagram D. DBMS ANSWER C Q 5 Which of the following is not a database management system software program? A. B. C. D. Microsoft Access DB-11 Oracle Database MYSQL ANSWER B Q 6 Which of the following is not a basic operation in a relational database? A. B. C. D. Select Join Allocate Project ANSWER C Q 7 A DBMS capability that specifies the structure of its database content is A. B. C. D. Data dictionary data definition language data manipulation language structured query language ANSWER B Q 8 A type of DBMS that stores audio and video files is A. B. C. D. Microsoft Access MYSQL Database Lite object-oriented DBMS ANSWER D Q 9 A database that stores current and historical data and is available to decision makers throughout a company is called A. B. C. D. MIS a data warehouse MYSQL data mining ANSWER B Q 10 A subset of a data warehouse that focuses on a single subject area is called a(n) A. B. C. D. subjective data warehouse classified data warehouse data mart object-oriented database ANSWER C Q 11 Which of the following helps develop knowledge about competitors and change decisionmaking behavior? A. B. C. D. Business intelligence Data mining Data quality audits Information policies ANSWER A Q 12 Which of the following enables users to view data using multiple dimensions? A. B. C. D. Data mining Online Analytical processing(OLAP) Predictive analysis Data audits ANSWER B Q 13 A type of data mining that recognizes patterns that describe a group to which an item belongs is A. B. C. D. Associations Sequences Clustering classification ANSWER D Q 14 A(n) ________ is used to identify which users and organizational units can share information. A. B. C. D. data quality policy data administration policy information policy database administration policy ANSWER C Q 15 Analysis of data quality often begins with a(n) A. B. C. D. information quality audit information quality audit database administration audit data cleansing. ANSWER B CHAPTER 6 Securing Information Systems Q 1 The methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards are known as: A. B. C. D. Controls Prevention Protection Security ANSWER: D Q 2 Because the Internet is so huge and so fast, when abuses occur: A. B. C. D. They can be easily stopped in a matter of minutes. They can have a widespread impact in a matter of minutes Special security systems are deployed to stop the abuse. None of the above. ANSWER: B Q 3 Which of the following statements about worms is not true? A. B. C. D. Worms are independent computer programs that copy themselves from one computer to other computers over a network Unlike viruses, worms operate on their own without attaching to other computer program files Worms destroy data, but they cannot alter programs Worms can even halt the operation of computer networks ANSWER: C Q 4 A Trojan horse is: A. B. C. D. Often a way for viruses or other malicious code to be introduced into a computer system Not a virus because it does not replicate A software program that appears to be benign but then does something unexpected All of the above. ANSWER A Q 5 The intentional disruption, defacement, or even destruction of a Web site or corporate information system is called A. B. C. D. Sniffing Cybervandalism Spoofing Logging ANSWER B Q 6 Setting up fake Web sites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data is called A. B. C. D. Identity theft Phishing Evil twins Pharming ANSWER B Q 7 According to the recent study cited in the textbook, when the security of a large firm is compromised, the company loses an average of almost A. B. C. D. $165,000 in stock market value per incident $165 in stock market value per incident $1.65 billion in stock market value per incident $1.65 million in stock market value per incident ANSWER C Q 8 Plans for the restoration of computing and communications services after they have been disrupted by a catastrophic event, such as an earthquake, flood, or terrorist attack, are called A. B. C. D. Disaster recovery plans Fault-tolerant systems Authorization management systems None of the above ANSWER A Q 9 Which of the following is not included in the management information system (MIS) audit? A. B. C. D. An assessment of financial and organizational impacts of each threat A list of all control weaknesses An estimate of the probability of the occurrence of control weaknesses Potential weaknesses of future projects ANSWER D Q 10 Which of the following statements about tokens is not true A. They are typically affixed to a computer and valid only on that computer B. They are physical devices similar to an identification card C. They are small gadgets that typically fit on key rings, and they display passcodes that change frequently D. They are designed to prove the identity of a single user ANSWER A Q 11 _____ known only to authorized users A. B. C. D. Malware Firewalls Passwords patches ANSWER C Q 12 process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver A. Security B. Encryption C. Smart card D. cyberfare ANSWER B Q 13 individual who intends to gain unauthorized access to a computer system A. B. C. D. Hackers Pharming Spyware token ANSWER A Q 14 Which of the following Malicious program do not replicate automatically? A. B. C. D. Trojan horse Viruses Warm Zombie ANSWER A Q 15 Which of the following is not an independent malicious program that need not any host program? A. B. C. D. Trap doors Trojan Horse Virus Worm ANSWER D Chapter 7 E-commerce: Digital Markets, Digital Goods Q 1 Because e-commerce is ubiquitous, it reduces A. B. C. D. Marketplace Price discrimination Dynamic pricing Transaction costs ANSWER D Q 2 "Richness" refers to: A. The complexity and content of a message B. How many people a business can connect with and how many products it can offer to those people C. The extent of interconnectedness between retailers and suppliers D. The ability of an Internet client to provide payment ANSWER A Q 3 Removing the middleman and selling directly to a consumer in a digital marketplace is called: A. B. C. D. Ubiquity Marketspace Reintermediation Disintermediation ANSWER D Q 4 Which of the following are examples of digital goods? A. B. C. D. 3-D TVs, iPods, and digital cameras Smart phones, microwave ovens, and cars Music tracks, videos, and books All of the above ANSWER C Q 5 A content provider: A. Provides a digital environment where buyers and sellers can meet, search for products, display products, and establish prices for those products B. Provides product, pricing, and availability information to individuals and businesses C. Creates revenue by providing digital content, such as digital news, music, photos, or video, over the Web D. None of the above ANSWER C Q 6 A method of publishing audio broadcasts via the Internet, which can later be downloaded to portable music players, is called A. B. C. D. Uploading Podcasting Streaming Blogging ANSWER B Q 7 A Web site that generates revenue by attracting a large audience of visitors who can then be exposed to advertisements can best be described as a(n) A. Affiliate Revenue Model B. Advertising Revenue Model C. Subscription Revenue Model D. Transaction Fee Revenue Model ANSWER B Q 8 Which of the following modifies the Web pages presented to each customer? A. B. C. D. Electronic customized marketing Infomarketing Micromarketing Personalization ANSWER D Q 9 Which of the following is not included among location-based m-commerce services A. B. C. D. Searching for local businesses Searching for movies and restaurants Obtaining driving instructions None of the above ANSWER D Q 10 Which of the following is a function of peer-to-peer payment systems A. Referring to digital currency that can be used for micropayments. B. Providing secure services for credit card payments on the Internet C. Sending money using the Web to individuals who are not set up to accept credit card payments D. Supporting electronic payment for online and physical store purchases of goods or services after the purchase has taken place ANSWER C Q 11 Electronic funds transfers are also called A. B. C. D. Wire transfers Money transfers Business transfer Telephone transfer ANSWER B Q 12 Some researchers define a fourth category of electronic commerce called ____, which includes individuals who buy and sell items among themselves A. B. C. D. C2C C2B B2B B2C ANSWER A Q 13 All of the following are techniques B2C e-commerce companies use to attract coustomers, except A. B. C. D. Registering with search engines Viral marketing Online ads Virtual marketing ANSWER D Q 14 Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser A. B. C. D. Affiliate program Click through Spam All of the above ANSWER B Q 15 Which of the following is not considered to be one of the three phases of e-commerce? A. B. C. D. Innovation Consolidation Preservation Reinvention ANSWER C 1) Business firms invest heavily in information systems to achieve: Select one: a. All of the above. b. Operational excellence and new products, services, and business models. c. Competitive advantage and survival d. Customer and supplier intimacy, and improved decision making. 2) Every business has an information value chain in which: Select one: a. Raw data are transformed through various stages that add value to that information. b. Raw data are systematically acquired. c. All of the above. d. The primary purpose is to contribute to corporate value. 3) Output that is returned to appropriate members of the organization to help them evaluate or correct the input stage is known as: Select one: a. Software. b. None of the above c. Feedback. d. Environment. 4) Which of the following statements about business processes is not true? Select one: a. Information systems automate many business processes. b. Informal work practices may also be included in business processes. c. The rules in a business process guide employees in a variety of procedures, from writing an invoice to responding to customer complaints. d. Business processes include only formal, written rules for accomplishing tasks and have been developed over a long period. 5) Which of the following statements is not true? Select one: a. Facebook has more than 750 million "Friends" worldwide. b. Blogging is creating an explosion of new writers. c. Blogging is creating new forms of customer feedback that did not exist five years ago. d. Internet advertising is not as popular as it used to be. 6) A very clear understanding of how a business works can be achieved by Select one: a. Using metrics to measure efficiency b. Analyzing the software c. Analyzing the computer hardware d. Analyzing the business processes 7) Information systems are sociotechnical systems because: Select one: a. All of the above. b. They are composed of machines and devices. c. Substantial intellectual investments are required to make them work properly. d. They are composed of "hard" physical technology and substantial social investments are required to make them work properly 8) The contemporary approach to information systems that emphasizes mathematically based models to study information systems is the: Select one: a. Behavioral approach. b. Sociotechnical approach. c. None of the above. d. technical approach. 9) Which of the following is not an important managerial complementary asset? Select one: a. Incentive systems that monitor and reward individual innovation. b. Strong senior management support for change. c. An emphasis on teamwork and collaboration. d. A management culture that is very structured. 10) Which one of the following business processes is not part of the finance and accounting functional area? Select one: a. Paying creditors b. Creating financial statements c. Managing cash accounts d. Enrolling employees in benefits plans 11) As transaction costs decrease: Select one: a. The firm should not consider outsourcing. b. The number of employees in the firm should grow. c. The number of employees should shrink. d. A firm's size should grow. 12) Organizational culture is a powerful unifying force that: Select one: a. Restrains political conflict b. All of the above. c. Restrains agreement on procedures and practices. d. Restrains common understanding. 13) Which of the following is not an approach that organizations traditionally used to reduce transaction costs? Select one: a. Buying suppliers and distributors. b. Growing larger. c. Eliminating relationships with suppliers and distributors. d. Reducing costs through vertical integration 14) Which of the following statements is not true? Select one: a. In the technical view of the firm, people who work in organizations develop customary ways of working. b. In the technical view of the firm, people never gain attachments to relationships. c. In the behavioral view of the firm, people who work in organizations develop customary ways of working. d. In the technical view of the firm, people gain attachments to relationships. 15) Some of the changes that occur in business firms because of new information technology (IT) investments: Select one: a. Have results that may not meet expectations. b. Cannot be foreseen. c. Have results that meet expectations. d. All of the above. 16) Which of the following is an example of a core competency? Select one: a. Being the best package delivery service. b. All of the above. c. Being the world's best miniature parts designer d. Being the best thin-film manufacturer. 17) According to Porter's competitive forces model: Select one: a. new companies rarely enter the marketplace. b. There is usually no substitute for a particular company's product or service. c. A profitable company depends on its ability to attract and retain customers and charge them high prices. d. Suppliers have no impact on a firm's profits. 18) Which of the following is directly related to the question: "How is the company creating value to the customer?" Select one: a. How is the industry using information technology? b. What are the direction and nature of change within the industry? c. What is the structure of the industry in which the firm is located? d. What are the business, firm, and industry value chains for this particular firm? 19) Which of the following is not a generic strategy for competing? Select one: a. Product differentiation. b. Reduction of customer and supplier intimacy. c. Focus on market niche. d. Low-cost leadership. 20) The firm is viewed as a "nexus of contracts" among self-interested individuals rather than a unified, profit-maximizing entity, according to Select one: a. Agency theory. b. Transaction cost theory. c. Value-added theory. d. Outsourcing theory. 21) A basic ethical concept that means mechanisms are in place to determine who took responsible action or who is responsible for certain actions is Select one: a. Responsibility. b. Liability. c. Accountability d. due process. 22) Correlating relationships to find obscure hidden connections in disparate databases and other sources is called Select one: a. due process b. nonobvious relationship awareness (NORA) c. Profiling d. informed consent 23) Using computers to combine data from multiple sources and creating electronic dossiers of detailed information on individuals is called Select one: a. due process b. informed consent c. nonobvious relationship awareness (NORA) d. Profiling 24) Which moral dimension of the information age involves cultural values and practices? Select one: a. Accountability and control b. Information rights and obligations c. Quality of life d. Property rights and obligations 25) Most American and European privacy law is based on a regime called Select one: a. opt-out models of informed consent. b. privacy rights of individuals. c. fair information practices (FIP). d. safe harbor theories 26) Which of the following statements is false? Select one: a. An IBM is now the only provider of mainframes. b. Mainframes have virtually disappeared c. The mainframe market has grown steadily over the past decade d. IBM has repurposed its mainframes so that they can be used as giant servers 27) Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are Select one: a. Smaller than a breadbox b. The size of a pencil c. 10,000 times thinner than a human hair d. The size of a human hair. 28) Which of the following is an interpretation of Moore's law? Select one: a. All of above b. The price of computing falls by half every 18 months. c. Computing power doubles every 18 months d. The power of microprocessors doubles every 18 months 29) Which of the following is not included in a firm's IT infrastructure investment? Select one: a. None of the above b. Hardware, software, and services c. Consulting, education, and training d. Telecommunications networking equipment and services 1. The information of MIS comes from the A. internal source B. external source C. both internal and external source D. none of the above C.both internal and external source 2.The back bone of any organization is A. information B. employee C. management D. capital A.information 3.The flow of information through MIS is A. need dependent B. organization dependent C. information dependent D. management dependent A.need dependent 4.The elements of control will consist of A. authority, direction, management B. authority, direction, information C. authority, application, management D. authority, application, information A.authority, direction, management 5.Internal information for MIS may come from any one of the following department. A. customers care department B. hr department C. marketing department D. production department A.customers care department 6. MIS normally found in a manufacturing organization will not be suitable in the ______. A. service sector B. banking sector C. agriculture sector D. all of the above A.service sector 7. _______ details are given by Management to Marketing Service System. A. customer B. employee C. supplier D. none of the above C.supplier 8. The basic component(s) of DSS is (are) A. database B. model base C. dss software system D. all of the above D.all of the above 9. GDSS is the short form of A. group decision support system B. group discussion support system C. group decision service system D. group discussion support source A.group decision support system 10. Decision trees could be represented in different ways such as A. bottom to top B. left to right C. top to bottom D. all of the above D.all of the above 11. The types of data transmission modes are A. half duplex. , duplex. , singlex B. half duplex. , duplex. , simplex C. half duplex. , duplex. , half singlex D. singlex, duplex, half triplex B.half duplex. , duplex. , simplex 12. Using ______________ a decision maker can make hypothetical changes to problem data and observe theimpact on the results A. simulation B. what-if analysis C. optimization D. goal-seeking analysis B.what-if analysis 13. ______________ involves the investigation of new approaches to existing problems. A. systems analysis B. creative analysis C. critical analysis D. organizational analysis B.creative analysis 14. Which of the following is NOT a goal of transaction processing systems? A. capture, process, and store transactions B. produce a variety of documents related to routine business activities C. reduce manual effort associated with processing business transactions D. produce standard reports used for management decision making D.produce standard reports used for management decision making 15. In ______________ organization, authority is delegated down the hierarchy. A. traditional B. classical C. operational D. absolute B.classical 16. The starting point of MIS planning is general ______________ planning. A. objective. B. managers. C. business. D. firms. C.business. 17. ______________ leader who commands both positional and personal influence. Team. A. team. B. project. C. formal. D. informal. C.formal. 18. ______________ is a prominent attribute of management information procured through MIS of an organization. A. explicitness. B. completeness. C. accuracy. D. exception based. A.explicitness. 19. Critical information for top management is provided by ______________ information system. A. expert. B. executive. C. decision. D. managerial. B.executive. 20. who have concerned with tactical (short-term) operational problems and decision making ? A. supervisors B. mobile managers C. middle managers D. executive managers E. none of the above F. both A & b 21. Management information systems (MIS) A. Development and share documents that support day-today office activities. B. process business transactions (e.g., time cards, payments, orders, ecapture and reproduce the knowledge of an expert problem solver C. use the transaction data to produce information needed by managers to run the business D. none of the above 22. Which one is the organizations Back Bone? A. capital B. employee C. management D. information E. both A and B 23. _________ is the general transformation cycle for information? A. data to information to knowledge. B. data to knowledge to information. C. knowledge to data to information. D. information to data to knowledge E. none of the above. F. both A & b. 24. _______ represented an information flow diagram? A. Source B. Entity C. Attribute D. Process E. Database F. none of these 25. _______ is a part of a static view of information? A. Metadata B. Logical data model C. Data flow model D. Information process model E. both A & b F. None of these 26. Information systems that support the business functions that reach out to suppliers are known as: A. decision support systems B. expert information systems C. back-office information systems D. front office information systems E. none of the above F. both A & b 27. 1. _______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction. a) Network Security b) Database Security c) Information Security d) Physical Security 28. From the options below, which of them is not a threat to information security? a) Disaster b) Eavesdropping c) Information leakage d) Unchanged default password 29. From the options below, which of them is not a vulnerability to information security? a) flood b) without deleting data, disposal of storage media c) unchanged default password d) latest patches and updates not done 30. _____ platforms are used for safety and protection of information in the cloud. a) Cloud workload protection platforms b) Cloud security protocols c) AWS d) One Drive 31. Which of the following information security technology is used for avoiding browser-based hacking? a) Anti-malware in browsers b) Remote browser access c) Adware remover in browsers d) Incognito mode in a browser 32. Compromising confidential information comes under _________ a) Bug b) Threat c) Vulnerability d) Attack 33. Lack of access control policy is a _____________ a) Bug b) Threat c) Vulnerability d) Attack 34. Possible threat to any information cannot be ________________ a) reduced b) transferred c) protected d) ignored 35. Information Technology – A. Describes any equipment concerned with the capture, storage, transmission or presentation of information. B. Is referred to as ICT (Information Communications Technology), emphasizing the importance of communications. C. Both A&B D. None 36.Information systems (ISs) – A. Are the systems responsible for the provision of information for management. B. They incorporate IT, people, business processes and procedures used to manage the capture and communication of information. C. They involve complex and dynamic interaction between people, technology and process to ensure the delivery of appropriate and timely information to management. D. All of the above 37.An effective IS (Information system) should have various logs that individuals examine regularly and take appropriate action on when necessary. Examples of logs include: A. Data entry staff should keep full details of each batch of work, with duration and errors. B. Backups, storage of data off-site should be logged C. Software application systems may generate their own logs of errors D. All of the above 38.A security sub-system could maintain detailed logs of who did what and when and also if there were any attempted security violations. A. True B. False 39.Quality management is the means by which IS (Information system) department-based processes are controlled, measured and improved. Areas of control for quality management include: A. B. C. D. Software development, maintenance and implementation Acquisition of hardware and software Security and Human resource management All of the above 40.Which of the following is correct? A. The development and maintenance of comprehensive procedures by the IS department is evidence of effective governance of IT resources. B. C. D. Insistence on observance of processes and procedures is key to the effectiveness and efficiency of the IS organization. Both A&B None MIS MCQS Q.1 Choose the correct alternatives from the options and rewrite the sentence. 1) Information systems that allow data to be shared throughout the organization are called systems. a) Unintegrated c) Unrestricted b) Integrated d) Bounded 2) Assembling a product, identifying customers and hiring employees is a) Transaction c) Business Process: 3)EDP means. a) Electronic Data Predict b) Electronic Data Processing 4)If a university sets up a web-based information system that faculty could access to record student grades and to advise students, that would be an example of a/an a) CRM c) ERP b) Intranet d) Extranel 5)Which one of the following is not one of the major types of e-commers b) B2C a) C2B c) B2Bd) C2C 6)The role of MIS in an organization can be compared to the role ofin the body. a) Brain. b) heart c) Lever d) stomach 7)DSS stands for a) Direct Support System c) Decade Support System b)Decision Support System d) All 8)The objective of the MIS is to provide information for a the process of management. support a) Tool b) goal d) analysis c) decision. 10) The information generally relates to the top management functions in a business organization a) Tactical b) Strategic c) Operational d) Financial 12)Staffing is behaviorally related t0 a) Organizing b) Controlling d) Proceedings c) Managing 13) Information refers to a) Process c) Task b) Event d) Data 14) System is a group of elements organized with a a) Purpose b) Data c) Instruction d) Procedure 15).The dimension of e-commerce that enables commerce across national boundaries is called _ A. interactivity B. global reach C. richness D. ubiquity 16)Which of the following describes e‐commerce? A. Doing business electronically 17)Which one of the following is not one of the major types of e-commerce? A. C2B B. B2C C. B2B D. C2C 18) Information systems can facilitate supply chain management by___ .A. tracking the status of orders. B . know the employee history. C. profit and loss predictions 19) The components of the system that provides information A. planning. B. control.C. testing .D. execute 20)There are _____ positive steps to change the knowledge of the organizational behavior A. 4. B. 3. C. 2. D.1 21) The _____ will make the automated inventory system understandable to everyone. A. statement.B. programs.C. document.D.blocks 22)The major drawbacks in decision making by MIS is difficult due ____ for business.problems. A. structure.B. rules.C. strategy.D. conditions. 23)_____ is a technique in decision making uses repetitive and routine task. A. Unstructured. B. Structured. C. Un programmed. D. Programmed. 24) The ____ component plays a decision rule for the computer. A. program.B. statements.C. input data.D. conditions 25)The starting point of MIS planning is general ______ planning. A. objective.B. managers C. business.D. firms 26)....... system is concerned with the way information is used for purpose of control and appliestechnologies. A. Feedback.B. Interview.C. Interaction.D. Conference 27)The final element of feedback is essential fro system operation and for ____ .A. self-regulation. B. correct errors. C. testing.D. debugging. 28) In among the firms executives, managers, and supervisors are comes under _____ of workers. A. knowledge. B. leader.C. informer.D. higher level. 29) In MIS ____ plays economically sound and logically in development process A. information.B. data.C. statements. D. data flow 30)information system uses the information technology to develop all features in the products A. Structure.B. Strategic.C. Systematic.D. Statistical 31)Critical information for top management is provided by ____ information system. A. Expert .B. Executive.C. Decision.D. Managerial 33)The term used to describe those people whose jobs involve sponsoring and funding the project to develop, operate and maintain the information system is a) Information worker b) Internal system user c) Systems owner 34)The back bone of any organization is a) Information b) Employee c) Management d) Capital 35)Decision makers who are concerned with tactical (short-term) operational problems and decision making are: a) Middle managers c) Supervisor b) Executive managers d) Mobile Managers 36)The basic component(s) of DSS is(are) a) Database c) DSS support system b) Model base d) All of the above 37)GDSS is the short form of a) Group decision support system 38)Assembling a product, identifying customers and hiring employees are a) Transaction b) Phases: c) Business Process d) Business Function 39)Information systems can facilitate supply chain management by a) Tracking the status of orders c) Profit and loss predictions 40)Which of the following describes commerce? a)Doing business electronically b) Doing business c) Sales of goods d) All of the above 41)HRM stands for a) Human Resource Manager c) Human Re Manager b) Human Resource Management 42)Which functional area is responsible for taking customer orders? a) Marketing and Sales 43)Which term relates to the technical capabilities that allow systems to connect with one another through standardized interfaces called Web services? a) Enterprise Resource Planning b) Supply chain Management d) Service-Oriented Architecture 44)Projections and responses to queries are Information output characteristics associated with ________. C. Executive Support System (ESS) 45)What should not be part of an acceptable use policy? A. Allowable use of systems B. Legal obligations C. Encryption policies 46)Which of the following is a network of facilities for procuring materials, transforming raw materials into intermediate and finished products, and distributing finished products to customers? A. production chain B. primary chain C. supply chain 47)______, _______ and society need to use a variety of systems to organize the collection, storage, processing, retrieval and communication of information. A. Management, society C. Individuals, organizations 48)MIS is normally found in ______sector A. Service B. Education C. Manufacturing D. Marketing 49)The Management Information System receives input from the ______ A. SSL B. GPS C. TPS D. LMS 50)_______ is an important factor of a management information system. A. Information B. System C. Planning D. Personnel 1. ___ is an organized portfolio of formal systems for obtaining processing and delivering information in support of the business operations and management of an organization. a. MIS b. DSS c. MRS d. None of the above 2. ___ expressly designed for the support of individual and collective decision-making. a. MIS b. DSS c. TPS d. OIS 3. ___ are formal social units devoted to the attainment of specific goals. a. Management b. Organization c. Decision support system d. None of these 5. The cost of information can be ___. a. Costly b. Valuable c. Processing d. None of the above 7. Diagnosis of information needs can occur at the individual managerial or organizational levels. a. True b. False 8. Sociological approaches help us understand the organizational behavior of people. a. True b. False 11. Executive managers establish the overall direction of an organization by setting its strategy and policies. a. True b. False 12. ___ can occur at the individual, group, organizational or extra-organizational level. a. Planning b. Controlling c. Organizing d. Scheduling 13. Tactical plans may focus on decisions staffing, advertising, and pricing. a. True b. False 14. ___ ensuring that performance meets established standards that worker’s activities occur as planned and that the organization process. a. Controlling b. Planning c. Leading d. Organizing 15. ___ is the process of recording, classifying, and summarizing the financial activities of an organization. a. Planning b. Managerial c. Accounting d. Diagnosis 16. Humans and computers are ___ in their ability to filter and save information. a. Similar b. Different c. Complementary d. None of the above 17. EDI is an example of ___. a. Decision-making b. Boundary system c. Coordination d. Modeling 20. MRS stands for ___. a. Management reporting system b. Management resource system 21. EIS should offer the capability to ___into the data. a. Drill down b. Drill up c. Drill diagonal d. All of the above 22. A ___ strategy seeks to achieve competitive advantages by allowing the business unit to make more profit than its competitors. a. Focus b. Cost leadership c. Linkage d. Information leadership 23. Security means protection against theft, manipulation, and loss of data. a. True b. False 24. EMS stands for the enterprise management system. a. True b. False 25. ___ is a feature provided for ensuring that the transaction is completed with regard to the business rules set by the management. a. Advocacy b. Authorization c. Signature 26. The architecture of the MIS plan provides: a. A way to handle the system or subsystem by way of simplificatio0n, coupling, and decoupling of subsystems. 27. Michael hammer defines re-engineer as ___ and radical redesign of business process to achieve the performance such as cost, quality, service, and speed. a. Business process b. The fundamental rethinking c. Organization restructuring 28. The ___ calls for trimming and chopping of these designs so that the cost is reduced, service is improved and the customer gets the higher value at a higher speed. a. Business process b. Radical redesign 29. Re-reengineering calls for a change in the performance measures:- the cost, quality, efficiency, overheads, and many others. a. True b. False 30. A ___ process in any area of the business organization performs basic steps such as, receive input, measuring, analyzing, documenting, performing, process, record/storing, access, produce, and communicating. a. Value b. Decision making c. Business d. Re-engineering 31. A ___ is a measure, an intangible measure, which is difficult to count in clear terms. a. Model b. Business c. Value 33. The number of steps in any business process related to the data search, its matching, collecting, validating, confirming, and conforming are carried out in the redesigned process. a. True b. False 34. ___ is the process of identifying a problem, developing alternative solutions, and choosing and implementing. a. Decision-making b. Business c. Value 35. Decision-making is a ___ activity. a. Intuitive b. Cognitive c. Systematic d. Analytic 36. A ___ decision maker approaches a problem by structuring it and applying a well-defined method to lead to a solution. a. Intuitive b. Systematic c. Cognitive d. All the above 37. ___ systems are interactive information systems that assist a decision-maker in approaching ill-structured problems by offering analytical models and access to database. a. Decision making b. Systematic c. Cognitive d. Decision support systems 38. The components of DSS – a. Data management subsystems b. Model management sub-system c. Dialog management sub-system d. All of the above 39. ___ systems help to analyze historical and current data either on-demand or periodically. b. Data analysis system 40. A ___ is the actual system that a manager works with during the decision process. a. Specific DSS b. DSS generators c. DSS tools 41. True or False – a. Formal sources provide information in a less structured way. b. Informal sources provide information in a relatively organized and predictable fashion. A. a & b true B. a & b False C. a – true, b – false D. b – true, a – false 43. ___, ___, and society need to use a variety of systems to organize the collection, storage, processing, retrieval, and communication of information. a. Management, society c. Individuals, organizations 44. MIS is both an area of ___ and a ___ of scholarly inquiry. a. Design, diagnosis b. Practice, discipline c. Evaluation, implementation 46. True or False – a. At the highest level, managers are concerned with supervising the conduct of day-to-day activities. b. At the lowest level, managers are concerned with setting long-term goals and directions for the organization. A. Both are true B. Both are false ‘ C. A – true, b-false D. A – false, b – true 47. ___ managers who act as project managers might be responsible for one or more unique protects and ___ managers supervise teams of workers who must accomplish a specific goal. a. Middle, project b. Project, middle c. Top, middle d. Top, project 48. ___ refers to taking actions that direct and motivate employees to accomplish personal and organizational goals. ___ establishing a formal reporting structure and a system of accountability among workers. a. Organizing, leading b. Planning, controlling c. Leading, organizing 49. Operations can encompass ___. a. Only manufacturing b. Manufacturing and the provision of services 50. ___ refers to the deployment, development, assessment, rewarding, and management of individual organizational members and worker groups. ___is the management of raw materials, partially completed goods service. b. Human resource management, Inventory control.