Uploaded by Vishal Phule

MIS ALL COMBINED MCQ`s

advertisement
1) -------------- is one of the concept of MIS.
a) Management
b) Material
c) Decision
d) Mechanism
2) The role of the MIS in an organization can be compared to the role of ------------ in the body.
a) head
b) heart
c) breathing
d) None of the above
3) The MIS helps the ------------- management in goal setting, strategic planning and evolving the
business plans and their implementation.
a) low level
b) middle level
c) top level
d) base level
4) DSS means -------------------------------- .
a) Data Support System
b) Decision synchronize System
c) Demand support System
d) Decision Support System
5) The person who ensures that systems are developed on time, within budget, and with
acceptable quality is a -----------------------.
a) project manager
b) systems designer
c) systems owner
d) external system user
6) ---------------------- is the first step in system development life cycle.
a) Designing
b) Planning
c) Analysis
d) Implementation
7) Inbound logistics and outbound logistics are the activities of -------------------- model.
a) force
b) tactical
c) value chain
d) cost analysis
8) ESS is the short form of --------------------------------a) Executive Sharing System
b) Executive Support System
c) Extended Support System
d) Executive shaping system.
9)The information of MIS comes from the -----------------.
a) Internal source b) External source c)Both internal and external source d)None of the
above
10) Marketing information systems is one of the –----------------- area of MIS.
a) relational
b) communicational
c) logical
d) functional
11) Decision making is a _______ activity.
a) Cognitive
b)Intuitive
c) Systematic
d) Analytic
12) Use of value-chain analysis to identify ------------- information systems.
a) static
b) strategic
c) dynamic
d) composite
13) Following is one of the competitive strategy for competing in marketplace.
a) Relational
b) Operational
c) Product Differentiation
d) Financial
14) –---------------covers the planning, control, and administration of the operations of a concern.
a) Management b) Information c) System
d) Transaction
15) The--------------------- are informed about the progress, achievements and shortfalls
in the activity and the targets.
a) logical Managers
b) functional managers
c) customers
d) top level managers
16) The basic components of DSS is are ----------------.
a) Database
b) Model base
c) DSS software system
d) All of the above
17) GDSS means -------------------------------- .
a) Group Decision Support System
c) General Decision Support System
b) Group Dedicated Support System
d) Group Decision Service System
18) –---------- competitive strategy develop products & services which are different from
what the competition offers.
a)Cost Leadership
b) Differentiation
c) Cost Focus
d) Tactical
19) -------------------- systems are developed in response to corporate business initiative and give
competitive advantage to the organization.
a) Operational information
b) Decision information
c) Strategic information
20) Following is one of the component of MIS.
a) Management
b) procedure
c) outcome
d) analysis
21) The back bone of any organization is ---------------------------a) Employee
b) information
c) management
d) capital
d) All
22) The information to an MIS comes from the ------------.
a)Internal source b) External source c) Both internal and external source
d) None of the above
23) Which of the following functions performs producing and delivering products and services?
a) Manufacturing and Production
c) Finance and Accounting
b) Sales and Marketing
d) Human Resources
24) Modelling and decision making are ------------------------ activities.
a) business processes
c) Information processing
b) management
d) None of the given options
25) An ---------------- is a stable ,formal social structure that takes resource from the environment
and
processes them to produce outputs.
a) Organization
b) Association
c) Union
d) None of these
26) ------------- are also called as standard operating procedure in an organization.
a) Politics
b) Routines
c) Management
d) Culture
27) --------------- refers to the principles of right and wrong that individuals, acting as free moral
agents, use to make choice to guide their behaviours.
a) Laws
b) Human rights
c) Ethics
d) Obligations
28) -------------- can take information about people from many disparate resources such as
employee applications, telephone records, customer listing.
a) NOVA
b) NOSA
c) NOPA
d) NORA
29) In IT infrastructure consists of a set of --------------------------and software applications that
are required to operate the entire enterprise
a) Physical devices
b) Logical devices
c) Perceptual devices
d) Virtual devices
30) ----------------- platforms include hardware, software and management services to support a
firm’s website including web hosting services ,routers and or cabling and wireless equipments.
a) Mainframe
b) Internet c) Data management
d) None of the these
Chapter 1 Information Systems in Global Business Today
1 Which of the following statements is not true?
-> Internet advertising is not as popular as it used to be.
2 When Thomas Friedman wrote that the world was now "flat" (2005), he meant that:
-> The Internet and global communications had greatly reduced the economic and cultural
advantages of developed countries.
3 Business firms invest heavily in information systems to achieve:
-> All of the above.
4 Output that is returned to appropriate members of the organization to help them
evaluate or correct the input stage is known as:
-> Feedback.
5 Which of the following statements about business processes is not true?
-> Business processes include only formal, written rules for accomplishing tasks and have been
developed over a long period.
6 Every business has an information value chain in which:
->All of the above.
7 Which of the following is not an important managerial complementary asset?
-> A management culture that is very structured.
8 Information systems are sociotechnical systems because:
-> All of the above.
9 The contemporary approach to information systems that emphasizes mathematically
based models to study information systems is the:
-> Technical approach.
10 Which of the following statements about the behavioural approach is not true?
-> This approach focuses on mathematical techniques for optimizing selected parameters within
an organization.
11 Which of the following statements does not apply to business processes?
-> Business processes always stand on their own
12 Which one of the following business processes is not part of the finance and accounting
functional area?
-> Enrolling employees in benefits plans
13 A very clear understanding of how a business works can be achieved by
-> Analyzing the business processes
14 Reports on the organization's current performance are provided by the
-> Management information system (MIS)
Chapter 2: Information Systems, Organizations, and Strategy
Q 1 Some of the changes that occur in business firms because of new information
technology (IT) investments:
A Cannot be foreseen.
B Have results that meet expectations.
C Have results that may not meet expectations.
D All of the above.
ANSWER D
Q 2 Which of the following statements is not true?
A In the technical view of the firm, people who work in organizations develop customary ways of
working.
B In the technical view of the firm, people gain attachments to relationships.
C In the behavioural view of the firm, people who work in organizations develop customary ways of
working.
D In the technical view of the firm, people never gain attachments to relationships.
ANSWER D
Q 3 Organizational culture is a powerful unifying force that:
A Restrains common understanding.
B Restrains agreement on procedures and practices.
C Restrains political conflict
D All of the above.
ANSWER C
Q 4 Which of the following is
not an approach that organizations traditionally used to reduce
transaction costs?
A Buying suppliers and distributors.
B Growing larger.
C Eliminating relationships with suppliers and distributors.
D Reducing costs through vertical integration.
ANSWER C
Q 5 As transaction costs decrease:
A A firm's size should grow.
B The number of employees in the firm should grow.
C The number of employees should shrink.
D The firm should not consider outsourcing.
ANSWER C
Q 6 The firm is viewed as a "nexus of contracts" among self-interested individuals
rather than a unified, profit-maximizing entity, according to
A Transaction cost theory.
B Value-added theory.
C Agency theory.
D Outsourcing theory.
ANSWER C
Q 7 According to Porter's competitive forces model:
A New companies rarely enter the marketplace.
B There is usually no substitute for a particular company's product or service.
C Suppliers have no impact on a firm's profits.
D A profitable company depends on its ability to attract and retain customers and charge them high
prices.
ANSWER D
Q 8 Which of the following is not a generic strategy for competing?
A Product differentiation.
B Reduction of customer and supplier intimacy.
C Focus on market niche.
D Low-cost leadership.
ANSWER B
Q 9 Which of the following is an example of a core competency?
A Being the world's best miniature parts designer
B Being the best package delivery service.
C Being the best thin-film manufacturer.
D All of the above.
ANSWER D
Q 10 Which of the following is directly related to the question: "How is the
company creating value to the customer?"
A What is the structure of the industry in which the firm is located?
B What are the business, firm, and industry value chains for this particular firm?
C What are the direction and nature of change within the industry?
D How is the industry using information technology?
ANSWER B
CHAPTER 3 Ethical and Social Issues in Information Systems
Q 1 Which moral dimension of the information age involves cultural values and
practices?
A Information rights and obligations
B Accountability and control
C Property rights and obligations
D Quality of life
ANSWER D
Q 2 Using computers to combine data from multiple sources and creating
electronic dossiers of detailed information on individuals is called
A nonobvious relationship awareness(NORA)
B Profiling
C due process
D informed consent
ANSWER B
Q 3 Correlating relationships to find obscure hidden connections in disparate
databases and other sources is called
A nonobvious relationship awareness(NORA)
B Profiling
C due process
D informed consent
ANSWER A
Q 4 A basic ethical concept that means mechanisms are in place to determine who
took responsible action or who is responsible for certain actions is
A Responsibility.
B Liability.
C Accountability
D due process.
ANSWER C
Q 5 Most American and European privacy law is based on a regime called
A fair information practices (FIP).
B privacy rights of individuals.
C safe harbor theories
D opt-out models of informed consent.
ANSWER A
Q 6 Tiny files deposited on a computer hard drive when a user visits certain Web
sites are called
A Web bugs.
B cookies
C safe harbors
D viruses
ANSWER B
Q 7 The ________ model of informed consent permits the collection of personal information
until the consumer specifically requests that data not be collected.
A safe harbor
B platform for privacy preferences
C Opt-out
D Opt-in
ANSWER D
Q 8 An intellectual work product used for a business purpose is classified as a ________
provided it is not based on information in the public domain
A copyright
B patent
C digital millennium copyright
D trade secret
ANSWER D
Q 9 Which law protects creators of intellectual property for the life of the author plus an
additional 70 years after the author's death?
A Copyright
B Trade secret
C Patent
D Digital Millennium copyright
ANSWER A
Q 10 Which law grants the owner an exclusive monopoly on the ideas behind an invention
for 20 years?
A Copyright
B Trade secret
C Patent
D Digital Millennium copyright
ANSWER C
Q 11 The commission of acts involving a computer that may not be illegal but are
considered unethical is known as
A A computer crime.
B information privacy violations
C lack of accountability.
D computer abuse
ANSWER D
Q 12 Which of the following is not a principal source of poor system performance?
A Software bugs and errors
B Government regulation
C Hardware or facility failures
D Poor input data quality
ANSWER B
Q 13 Which of the following makes it illegal to circumvent technology-based protections of
copyrighted materials?
A Freedom of Information Act of 1966
B E-Government Act of 2002
C World Intellectual Property Organization Treaty
D Electronic Communications Privacy Act of 1986
ANSWER C
Q 14 The single largest source of repetitive stress injuries is
A computer monitors
B computer keyboards.
C computer mouse
D Computer speakers.
ANSWER B
Q 15 The most common kind of computer-related repetitive stress injury is
A computer vision syndrome
B severe back pain
C technostress
D carpal tunnel syndrome (CTS).
ANSWER D
CHAPTER 5 Foundations of Business Intelligence: Databases and Information
Management
Q 1 Generalized categories of data on which we store and maintain information in a database is
called a(n)
A.
B.
C.
D.
primary key.
foreign key.
Entity
Attribute
ANSWER C
Q 2 The most common type of database is
A.
B.
C.
D.
Hierarchical
Network.
Oracle.
Relational.
ANSWER D
Q 3 The technical term for records in a database is
A.
B.
C.
D.
Tuple
Primary key
Foreign key
Field
ANSWER A
Q 4 You use a ________ to clarify table relationships in a relational database.
A. primary key
B. foreign key
C. entity-relationship diagram
D. DBMS
ANSWER C
Q 5 Which of the following is not a database management system software program?
A.
B.
C.
D.
Microsoft Access
DB-11
Oracle Database
MYSQL
ANSWER B
Q 6 Which of the following is not a basic operation in a relational database?
A.
B.
C.
D.
Select
Join
Allocate
Project
ANSWER C
Q 7 A DBMS capability that specifies the structure of its database content is
A.
B.
C.
D.
Data dictionary
data definition language
data manipulation language
structured query language
ANSWER B
Q 8 A type of DBMS that stores audio and video files is
A.
B.
C.
D.
Microsoft Access
MYSQL
Database Lite
object-oriented DBMS
ANSWER D
Q 9 A database that stores current and historical data and is available to decision makers
throughout a company is called
A.
B.
C.
D.
MIS
a data warehouse
MYSQL
data mining
ANSWER B
Q 10 A subset of a data warehouse that focuses on a single subject area is called a(n)
A.
B.
C.
D.
subjective data warehouse
classified data warehouse
data mart
object-oriented database
ANSWER C
Q 11 Which of the following helps develop knowledge about competitors and change decisionmaking behavior?
A.
B.
C.
D.
Business intelligence
Data mining
Data quality audits
Information policies
ANSWER A
Q 12 Which of the following enables users to view data using multiple dimensions?
A.
B.
C.
D.
Data mining
Online Analytical processing(OLAP)
Predictive analysis
Data audits
ANSWER B
Q 13 A type of data mining that recognizes patterns that describe a group to which an item
belongs is
A.
B.
C.
D.
Associations
Sequences
Clustering
classification
ANSWER D
Q 14 A(n) ________ is used to identify which users and organizational units can share
information.
A.
B.
C.
D.
data quality policy
data administration policy
information policy
database administration policy
ANSWER C
Q 15 Analysis of data quality often begins with a(n)
A.
B.
C.
D.
information quality audit
information quality audit
database administration audit
data cleansing.
ANSWER B
CHAPTER 6 Securing Information Systems
Q 1 The methods, policies, and organizational procedures that ensure the safety of the
organization's assets, the accuracy and reliability of its accounting records, and operational
adherence to management standards are known as:
A.
B.
C.
D.
Controls
Prevention
Protection
Security
ANSWER: D
Q 2 Because the Internet is so huge and so fast, when abuses occur:
A.
B.
C.
D.
They can be easily stopped in a matter of minutes.
They can have a widespread impact in a matter of minutes
Special security systems are deployed to stop the abuse.
None of the above.
ANSWER: B
Q 3 Which of the following statements about worms is not true?
A.
B.
C.
D.
Worms are independent computer programs that copy themselves from one computer to
other computers over a network
Unlike viruses, worms operate on their own without attaching to other computer program
files
Worms destroy data, but they cannot alter programs
Worms can even halt the operation of computer networks
ANSWER: C
Q 4 A Trojan horse is:
A.
B.
C.
D.
Often a way for viruses or other malicious code to be introduced into a computer system
Not a virus because it does not replicate
A software program that appears to be benign but then does something unexpected
All of the above.
ANSWER A
Q 5 The intentional disruption, defacement, or even destruction of a Web site or corporate
information system is called
A.
B.
C.
D.
Sniffing
Cybervandalism
Spoofing
Logging
ANSWER B
Q 6 Setting up fake Web sites or sending e-mail messages that look like those of legitimate
businesses to ask users for confidential personal data is called
A.
B.
C.
D.
Identity theft
Phishing
Evil twins
Pharming
ANSWER B
Q 7 According to the recent study cited in the textbook, when the security of a large firm is
compromised, the company loses an average of almost
A.
B.
C.
D.
$165,000 in stock market value per incident
$165 in stock market value per incident
$1.65 billion in stock market value per incident
$1.65 million in stock market value per incident
ANSWER C
Q 8 Plans for the restoration of computing and communications services after they have been
disrupted by a catastrophic event, such as an earthquake, flood, or terrorist attack, are called
A.
B.
C.
D.
Disaster recovery plans
Fault-tolerant systems
Authorization management systems
None of the above
ANSWER A
Q 9 Which of the following is not included in the management information system (MIS) audit?
A.
B.
C.
D.
An assessment of financial and organizational impacts of each threat
A list of all control weaknesses
An estimate of the probability of the occurrence of control weaknesses
Potential weaknesses of future projects
ANSWER D
Q 10 Which of the following statements about tokens is not true
A. They are typically affixed to a computer and valid only on that computer
B. They are physical devices similar to an identification card
C. They are small gadgets that typically fit on key rings, and they display passcodes that
change frequently
D. They are designed to prove the identity of a single user
ANSWER A
Q 11 _____ known only to authorized users
A.
B.
C.
D.
Malware
Firewalls
Passwords
patches
ANSWER C
Q 12 process of transforming plain text or data into cipher text that cannot be read by anyone
other than the sender and the intended receiver
A. Security
B. Encryption
C. Smart card
D. cyberfare
ANSWER B
Q 13 individual who intends to gain unauthorized access to a computer system
A.
B.
C.
D.
Hackers
Pharming
Spyware
token
ANSWER A
Q 14 Which of the following Malicious program do not replicate automatically?
A.
B.
C.
D.
Trojan horse
Viruses
Warm
Zombie
ANSWER A
Q 15 Which of the following is not an independent malicious program that need not any host
program?
A.
B.
C.
D.
Trap doors
Trojan Horse
Virus
Worm
ANSWER D
Chapter 7 E-commerce: Digital Markets, Digital Goods
Q 1 Because e-commerce is ubiquitous, it reduces
A.
B.
C.
D.
Marketplace
Price discrimination
Dynamic pricing
Transaction costs
ANSWER D
Q 2 "Richness" refers to:
A. The complexity and content of a message
B. How many people a business can connect with and how many products it can offer to
those people
C. The extent of interconnectedness between retailers and suppliers
D. The ability of an Internet client to provide payment
ANSWER A
Q 3 Removing the middleman and selling directly to a consumer in a digital marketplace is
called:
A.
B.
C.
D.
Ubiquity
Marketspace
Reintermediation
Disintermediation
ANSWER D
Q 4 Which of the following are examples of digital goods?
A.
B.
C.
D.
3-D TVs, iPods, and digital cameras
Smart phones, microwave ovens, and cars
Music tracks, videos, and books
All of the above
ANSWER C
Q 5 A content provider:
A. Provides a digital environment where buyers and sellers can meet, search for products,
display products, and establish prices for those products
B. Provides product, pricing, and availability information to individuals and businesses
C. Creates revenue by providing digital content, such as digital news, music, photos, or
video, over the Web
D. None of the above
ANSWER C
Q 6 A method of publishing audio broadcasts via the Internet, which can later be downloaded to
portable music players, is called
A.
B.
C.
D.
Uploading
Podcasting
Streaming
Blogging
ANSWER B
Q 7 A Web site that generates revenue by attracting a large audience of visitors who can then be
exposed to advertisements can best be described as a(n)
A. Affiliate Revenue Model
B. Advertising Revenue Model
C. Subscription Revenue Model
D. Transaction Fee Revenue Model
ANSWER B
Q 8 Which of the following modifies the Web pages presented to each customer?
A.
B.
C.
D.
Electronic customized marketing
Infomarketing
Micromarketing
Personalization
ANSWER D
Q 9 Which of the following is not included among location-based m-commerce services
A.
B.
C.
D.
Searching for local businesses
Searching for movies and restaurants
Obtaining driving instructions
None of the above
ANSWER D
Q 10 Which of the following is a function of peer-to-peer payment systems
A. Referring to digital currency that can be used for micropayments.
B. Providing secure services for credit card payments on the Internet
C. Sending money using the Web to individuals who are not set up to accept credit card
payments
D. Supporting electronic payment for online and physical store purchases of goods or
services after the purchase has taken place
ANSWER C
Q 11 Electronic funds transfers are also called
A.
B.
C.
D.
Wire transfers
Money transfers
Business transfer
Telephone transfer
ANSWER B
Q 12 Some researchers define a fourth category of electronic commerce called ____, which
includes individuals who buy and sell items among themselves
A.
B.
C.
D.
C2C
C2B
B2B
B2C
ANSWER A
Q 13 All of the following are techniques B2C e-commerce companies use to attract coustomers,
except
A.
B.
C.
D.
Registering with search engines
Viral marketing
Online ads
Virtual marketing
ANSWER D
Q 14 Which term represents a count of the number of people who visit one site, click on an ad,
and are taken to the site of the advertiser
A.
B.
C.
D.
Affiliate program
Click through
Spam
All of the above
ANSWER B
Q 15 Which of the following is not considered to be one of the three phases of e-commerce?
A.
B.
C.
D.
Innovation
Consolidation
Preservation
Reinvention
ANSWER C
1) Business firms invest heavily in information systems to achieve:
Select one:
a. All of the above.
b. Operational excellence and new products, services, and business models.
c. Competitive advantage and survival
d. Customer and supplier intimacy, and improved decision making.
2) Every business has an information value chain in which:
Select one:
a. Raw data are transformed through various stages that add value to that information.
b. Raw data are systematically acquired.
c. All of the above.
d. The primary purpose is to contribute to corporate value.
3) Output that is returned to appropriate members of the organization to help them evaluate or
correct the input stage is known as:
Select one:
a. Software.
b. None of the above
c. Feedback.
d. Environment.
4) Which of the following statements about business processes is not true?
Select one:
a. Information systems automate many business processes.
b. Informal work practices may also be included in business processes.
c. The rules in a business process guide employees in a variety of procedures, from writing an
invoice to responding to customer complaints.
d. Business processes include only formal, written rules for accomplishing tasks and have
been developed over a long period.
5) Which of the following statements is not true?
Select one:
a. Facebook has more than 750 million "Friends" worldwide.
b. Blogging is creating an explosion of new writers.
c. Blogging is creating new forms of customer feedback that did not exist five years ago.
d. Internet advertising is not as popular as it used to be.
6) A very clear understanding of how a business works can be achieved by
Select one:
a. Using metrics to measure efficiency
b. Analyzing the software
c. Analyzing the computer hardware
d. Analyzing the business processes
7) Information systems are sociotechnical systems because:
Select one:
a. All of the above.
b. They are composed of machines and devices.
c. Substantial intellectual investments are required to make them work properly.
d. They are composed of "hard" physical technology and substantial social investments are required
to make them work properly
8) The contemporary approach to information systems that emphasizes mathematically based
models to study information systems is the:
Select one:
a. Behavioral approach.
b. Sociotechnical approach.
c. None of the above.
d. technical approach.
9) Which of the following is not an important managerial complementary asset?
Select one:
a. Incentive systems that monitor and reward individual innovation.
b. Strong senior management support for change.
c. An emphasis on teamwork and collaboration.
d. A management culture that is very structured.
10) Which one of the following business processes is not part of the finance and accounting
functional area?
Select one:
a. Paying creditors
b. Creating financial statements
c. Managing cash accounts
d. Enrolling employees in benefits plans
11) As transaction costs decrease:
Select one:
a. The firm should not consider outsourcing.
b. The number of employees in the firm should grow.
c. The number of employees should shrink.
d. A firm's size should grow.
12) Organizational culture is a powerful unifying force that:
Select one:
a. Restrains political conflict
b. All of the above.
c. Restrains agreement on procedures and practices.
d. Restrains common understanding.
13) Which of the following is not an approach that organizations traditionally used to reduce
transaction costs?
Select one:
a. Buying suppliers and distributors.
b. Growing larger.
c. Eliminating relationships with suppliers and distributors.
d. Reducing costs through vertical integration
14) Which of the following statements is not true?
Select one:
a. In the technical view of the firm, people who work in organizations develop customary ways of
working.
b. In the technical view of the firm, people never gain attachments to relationships.
c. In the behavioral view of the firm, people who work in organizations develop customary ways of
working.
d. In the technical view of the firm, people gain attachments to relationships.
15) Some of the changes that occur in business firms because of new information technology (IT)
investments:
Select one:
a. Have results that may not meet expectations.
b. Cannot be foreseen.
c. Have results that meet expectations.
d. All of the above.
16) Which of the following is an example of a core competency?
Select one:
a. Being the best package delivery service.
b. All of the above.
c. Being the world's best miniature parts designer
d. Being the best thin-film manufacturer.
17) According to Porter's competitive forces model:
Select one:
a. new companies rarely enter the marketplace.
b. There is usually no substitute for a particular company's product or service.
c. A profitable company depends on its ability to attract and retain customers and charge
them high prices.
d. Suppliers have no impact on a firm's profits.
18) Which of the following is directly related to the question: "How is the company creating value to
the customer?"
Select one:
a. How is the industry using information technology?
b. What are the direction and nature of change within the industry?
c. What is the structure of the industry in which the firm is located?
d. What are the business, firm, and industry value chains for this particular firm?
19) Which of the following is not a generic strategy for competing?
Select one:
a. Product differentiation.
b. Reduction of customer and supplier intimacy.
c. Focus on market niche.
d. Low-cost leadership.
20) The firm is viewed as a "nexus of contracts" among self-interested individuals rather than a
unified, profit-maximizing entity, according to
Select one:
a. Agency theory.
b. Transaction cost theory.
c. Value-added theory.
d. Outsourcing theory.
21) A basic ethical concept that means mechanisms are in place to determine who took responsible
action or who is responsible for certain actions is
Select one:
a. Responsibility.
b. Liability.
c. Accountability
d. due process.
22) Correlating relationships to find obscure hidden connections in disparate databases and other
sources is called
Select one:
a. due process
b. nonobvious relationship awareness (NORA)
c. Profiling
d. informed consent
23) Using computers to combine data from multiple sources and creating electronic dossiers of
detailed information on individuals is called
Select one:
a. due process
b. informed consent
c. nonobvious relationship awareness (NORA)
d. Profiling
24) Which moral dimension of the information age involves cultural values and practices?
Select one:
a. Accountability and control
b. Information rights and obligations
c. Quality of life
d. Property rights and obligations
25) Most American and European privacy law is based on a regime called
Select one:
a. opt-out models of informed consent.
b. privacy rights of individuals.
c. fair information practices (FIP).
d. safe harbor theories
26) Which of the following statements is false?
Select one:
a. An IBM is now the only provider of mainframes.
b. Mainframes have virtually disappeared
c. The mainframe market has grown steadily over the past decade
d. IBM has repurposed its mainframes so that they can be used as giant servers
27) Nanotechnology uses individual atoms and molecules to create computer chips and other
devices that are
Select one:
a. Smaller than a breadbox
b. The size of a pencil
c. 10,000 times thinner than a human hair
d. The size of a human hair.
28) Which of the following is an interpretation of Moore's law?
Select one:
a. All of above
b. The price of computing falls by half every 18 months.
c. Computing power doubles every 18 months
d. The power of microprocessors doubles every 18 months
29) Which of the following is not included in a firm's IT infrastructure investment?
Select one:
a. None of the above
b. Hardware, software, and services
c. Consulting, education, and training
d. Telecommunications networking equipment and services
1. The information of MIS comes from the
A. internal source
B. external source
C. both internal and external source
D. none of the above
C.both internal and external source
2.The back bone of any organization is
A. information
B. employee
C. management
D. capital
A.information
3.The flow of information through MIS is
A. need dependent
B. organization dependent
C. information dependent
D. management dependent
A.need dependent
4.The elements of control will consist of
A. authority, direction, management
B. authority, direction, information
C. authority, application, management
D. authority, application, information
A.authority, direction, management
5.Internal information for MIS may come from any one of the following
department.
A. customers care department
B. hr department
C. marketing department
D. production department
A.customers care department
6. MIS normally found in a manufacturing organization will not be suitable in the
______.
A. service sector
B. banking sector
C. agriculture sector
D. all of the above
A.service sector
7. _______ details are given by Management to Marketing Service System.
A. customer
B. employee
C. supplier
D. none of the above
C.supplier
8. The basic component(s) of DSS is (are)
A. database
B. model base
C. dss software system
D. all of the above
D.all of the above
9. GDSS is the short form of
A. group decision support system
B. group discussion support system
C. group decision service system
D. group discussion support source
A.group decision support system
10. Decision trees could be represented in different ways such as
A. bottom to top
B. left to right
C. top to bottom
D. all of the above
D.all of the above
11. The types of data transmission modes are
A. half duplex. , duplex. , singlex
B. half duplex. , duplex. , simplex
C. half duplex. , duplex. , half singlex
D. singlex, duplex, half triplex
B.half duplex. , duplex. , simplex
12. Using ______________ a decision maker can make hypothetical changes to
problem data and observe theimpact on the results
A. simulation
B. what-if analysis
C. optimization
D. goal-seeking analysis
B.what-if analysis
13. ______________ involves the investigation of new approaches to existing
problems.
A. systems analysis
B. creative analysis
C. critical analysis
D. organizational analysis
B.creative analysis
14. Which of the following is NOT a goal of transaction processing systems?
A. capture, process, and store transactions
B. produce a variety of documents related to routine business activities
C. reduce manual effort associated with processing business transactions
D. produce standard reports used for management decision making
D.produce standard reports used for management decision making
15. In ______________ organization, authority is delegated down the hierarchy.
A. traditional
B. classical
C. operational
D. absolute
B.classical
16. The starting point of MIS planning is general ______________ planning.
A. objective.
B. managers.
C. business.
D. firms.
C.business.
17. ______________ leader who commands both positional and personal
influence. Team.
A. team.
B. project.
C. formal.
D. informal.
C.formal.
18. ______________ is a prominent attribute of management information
procured through MIS of an organization.
A. explicitness.
B. completeness.
C. accuracy.
D. exception based.
A.explicitness.
19. Critical information for top management is provided by ______________
information system.
A. expert.
B. executive.
C. decision.
D. managerial.
B.executive.
20. who have concerned with tactical (short-term) operational problems and
decision making ?
A. supervisors
B. mobile managers
C. middle managers
D. executive managers
E. none of the above
F. both A & b
21. Management information systems (MIS)
A. Development and share documents that support day-today office activities.
B. process business transactions (e.g., time cards, payments, orders, ecapture and
reproduce the knowledge of an expert problem solver
C. use the transaction data to produce information needed by managers to
run the business
D. none of the above
22. Which one is the organizations Back Bone?
A. capital
B. employee
C. management
D. information
E. both A and B
23. _________ is the general transformation cycle for information?
A. data to information to knowledge.
B. data to knowledge to information.
C. knowledge to data to information.
D. information to data to knowledge
E. none of the above.
F. both A & b.
24. _______ represented an information flow diagram?
A. Source
B. Entity
C. Attribute
D. Process
E. Database
F. none of these
25. _______ is a part of a static view of information?
A. Metadata
B. Logical data model
C. Data flow model
D. Information process model
E. both A & b
F. None of these
26. Information systems that support the business functions that reach out to
suppliers are known as:
A. decision support systems
B. expert information systems
C. back-office information systems
D. front office information systems
E. none of the above
F. both A & b
27. 1. _______ is the practice and precautions taken to protect valuable
information from unauthorised access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
28. From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
d) Unchanged default password
29. From the options below, which of them is not a vulnerability to information
security?
a) flood
b) without deleting data, disposal of storage media
c) unchanged default password
d) latest patches and updates not done
30. _____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive
31. Which of the following information security technology is used for avoiding
browser-based hacking?
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser
32. Compromising confidential information comes under _________
a) Bug
b) Threat
c) Vulnerability
d) Attack
33. Lack of access control policy is a _____________
a) Bug
b) Threat
c) Vulnerability
d) Attack
34. Possible threat to any information cannot be ________________
a) reduced
b) transferred
c) protected
d) ignored
35. Information Technology –
A. Describes any equipment concerned with the capture, storage, transmission or
presentation of information.
B. Is referred to as ICT (Information Communications Technology), emphasizing
the importance of communications.
C. Both A&B
D. None
36.Information systems (ISs) –
A. Are the systems responsible for the provision of information for management.
B. They incorporate IT, people, business processes and procedures used to
manage the capture and communication of information.
C. They involve complex and dynamic interaction between people, technology
and process to ensure the delivery of appropriate and timely information to
management.
D. All of the above
37.An effective IS (Information system) should have various logs that
individuals examine regularly and take appropriate action on when necessary.
Examples of logs include:
A. Data entry staff should keep full details of each batch of work, with duration
and errors.
B. Backups, storage of data off-site should be logged
C. Software application systems may generate their own logs of errors
D. All of the above
38.A security sub-system could maintain detailed logs of who did what and
when and also if there were any attempted security violations.
A. True
B. False
39.Quality management is the means by which IS (Information system)
department-based processes are controlled, measured and improved. Areas of
control for quality management include:
A.
B.
C.
D.
Software development, maintenance and implementation
Acquisition of hardware and software
Security and Human resource management
All of the above
40.Which of the following is correct?
A.
The development and maintenance of comprehensive procedures by the IS
department is evidence of effective governance of IT resources.
B.
C.
D.
Insistence on observance of processes and procedures is key to the
effectiveness and efficiency of the IS organization.
Both A&B
None
MIS MCQS
Q.1 Choose the correct alternatives from the options and rewrite the sentence.
1) Information systems that allow data to be shared throughout the organization
are called systems.
a) Unintegrated c) Unrestricted b) Integrated d) Bounded
2) Assembling a product, identifying customers and hiring employees is
a) Transaction c) Business Process:
3)EDP means.
a) Electronic Data Predict b) Electronic Data Processing
4)If a university sets up a web-based information system that faculty could access to record
student grades and to advise students, that would be an example of a/an
a) CRM c) ERP b) Intranet d) Extranel
5)Which one of the following is not one of the major types of e-commers
b) B2C a) C2B c) B2Bd) C2C
6)The role of MIS in an organization can be compared to the role ofin the body.
a) Brain. b) heart c) Lever d) stomach
7)DSS stands for
a) Direct Support System c) Decade Support System b)Decision Support System d) All
8)The objective of the MIS is to provide information for a the process of management.
support
a) Tool b) goal d) analysis c) decision.
10) The information generally relates to the top management functions in a business
organization
a) Tactical
b) Strategic c) Operational d) Financial
12)Staffing is behaviorally related t0
a) Organizing b) Controlling d) Proceedings c) Managing
13) Information refers to
a) Process c) Task b) Event d) Data
14) System is a group of elements organized with a
a) Purpose b) Data c) Instruction d) Procedure
15).The dimension of e-commerce that enables commerce across national boundaries is
called _
A. interactivity B. global reach C. richness D. ubiquity
16)Which of the following describes e‐commerce?
A. Doing business electronically
17)Which one of the following is not one of the major types of e-commerce?
A. C2B
B. B2C C. B2B
D. C2C
18) Information systems can facilitate supply chain management by___
.A. tracking the status of orders. B . know the employee history. C. profit and loss predictions
19) The components of the system that provides information
A. planning. B. control.C. testing .D. execute
20)There are _____ positive steps to change the knowledge of the organizational behavior
A. 4. B. 3. C. 2. D.1
21) The _____ will make the automated inventory system understandable to everyone.
A. statement.B. programs.C. document.D.blocks
22)The major drawbacks in decision making by MIS is difficult due ____ for
business.problems.
A. structure.B. rules.C. strategy.D. conditions.
23)_____ is a technique in decision making uses repetitive and routine task.
A. Unstructured. B. Structured. C. Un programmed. D. Programmed.
24) The ____ component plays a decision rule for the computer.
A. program.B. statements.C. input data.D. conditions
25)The starting point of MIS planning is general ______ planning.
A. objective.B. managers C. business.D. firms
26)....... system is concerned with the way information is used for purpose of control and
appliestechnologies.
A. Feedback.B. Interview.C. Interaction.D. Conference
27)The final element of feedback is essential fro system operation and for ____
.A. self-regulation. B. correct errors. C. testing.D. debugging.
28) In among the firms executives, managers, and supervisors are comes under _____ of
workers.
A. knowledge. B. leader.C. informer.D. higher level.
29) In MIS ____ plays economically sound and logically in development process
A. information.B. data.C. statements. D. data flow
30)information system uses the information technology to develop all features in the
products
A. Structure.B. Strategic.C. Systematic.D. Statistical
31)Critical information for top management is provided by ____ information system.
A. Expert .B. Executive.C. Decision.D. Managerial
33)The term used to describe those people whose jobs involve sponsoring and funding the
project to develop, operate and maintain the information system is
a) Information worker b) Internal system user c) Systems owner
34)The back bone of any organization is
a) Information b) Employee c) Management d) Capital
35)Decision makers who are concerned with tactical (short-term) operational problems and
decision making are:
a) Middle managers c) Supervisor b) Executive managers d) Mobile Managers
36)The basic component(s) of DSS is(are)
a) Database c) DSS support system b) Model base d) All of the above
37)GDSS is the short form of
a) Group decision support system
38)Assembling a product, identifying customers and hiring employees are
a) Transaction b) Phases: c) Business Process
d) Business Function
39)Information systems can facilitate supply chain management by
a) Tracking the status of orders c) Profit and loss predictions
40)Which of the following describes commerce?
a)Doing business electronically b) Doing business c) Sales of goods d) All of the above
41)HRM stands for
a) Human Resource Manager c) Human Re Manager b) Human Resource Management
42)Which functional area is responsible for taking customer orders?
a) Marketing and Sales
43)Which term relates to the technical capabilities that allow systems to connect with one
another through standardized interfaces called Web services?
a) Enterprise Resource Planning b) Supply chain Management d) Service-Oriented Architecture
44)Projections and responses to queries are Information output characteristics associated
with ________.
C. Executive Support System (ESS)
45)What should not be part of an acceptable use policy?
A.
Allowable use of systems B. Legal obligations C. Encryption policies
46)Which of the following is a network of facilities for procuring materials, transforming raw
materials into intermediate and finished products, and distributing finished products to
customers?
A.
production chain B.
primary chain C.
supply chain
47)______, _______ and society need to use a variety of systems to organize the collection,
storage, processing, retrieval and communication of information.
A.
Management, society
C. Individuals, organizations
48)MIS is normally found in ______sector
A. Service B. Education C. Manufacturing D. Marketing
49)The Management Information System receives input from the ______
A. SSL B. GPS C. TPS D. LMS
50)_______ is an important factor of a management information system.
A. Information B. System
C. Planning
D. Personnel
1. ___ is an organized portfolio of formal systems for obtaining processing and delivering
information in support of the business operations and management of an organization.
a. MIS b. DSS c. MRS d. None of the above
2. ___ expressly designed for the support of individual and collective decision-making.
a. MIS b. DSS c. TPS d. OIS
3. ___ are formal social units devoted to the attainment of specific goals.
a. Management b. Organization c. Decision support system d. None of these
5. The cost of information can be ___.
a. Costly b. Valuable c. Processing d. None of the above
7. Diagnosis of information needs can occur at the individual managerial or organizational
levels.
a. True b. False
8. Sociological approaches help us understand the organizational behavior of people.
a. True b. False
11. Executive managers establish the overall direction of an organization by setting its strategy
and policies.
a. True b. False
12. ___ can occur at the individual, group, organizational or extra-organizational level.
a. Planning b. Controlling c. Organizing d. Scheduling
13. Tactical plans may focus on decisions staffing, advertising, and pricing.
a. True b. False
14. ___ ensuring that performance meets established standards that worker’s activities occur as
planned and that the organization process.
a. Controlling b. Planning c. Leading d. Organizing
15. ___ is the process of recording, classifying, and summarizing the financial activities of an
organization.
a. Planning b. Managerial c. Accounting d. Diagnosis
16. Humans and computers are ___ in their ability to filter and save information.
a. Similar b. Different c. Complementary d. None of the above
17. EDI is an example of ___.
a. Decision-making b. Boundary system c. Coordination d. Modeling
20. MRS stands for ___.
a. Management reporting system b. Management resource system
21. EIS should offer the capability to ___into the data.
a. Drill down b. Drill up c. Drill diagonal d. All of the above
22. A ___ strategy seeks to achieve competitive advantages by allowing the business unit to
make more profit than its competitors.
a. Focus b. Cost leadership c. Linkage d. Information leadership
23. Security means protection against theft, manipulation, and loss of data.
a. True b. False
24. EMS stands for the enterprise management system.
a. True b. False
25. ___ is a feature provided for ensuring that the transaction is completed with regard to the
business rules set by the management.
a. Advocacy b. Authorization c. Signature
26. The architecture of the MIS plan provides:
a. A way to handle the system or subsystem by way of simplificatio0n, coupling, and
decoupling of subsystems.
27. Michael hammer defines re-engineer as ___ and radical redesign of business process to
achieve the performance such as cost, quality, service, and speed.
a. Business process b. The fundamental rethinking c. Organization restructuring
28. The ___ calls for trimming and chopping of these designs so that the cost is reduced, service
is improved and the customer gets the higher value at a higher speed.
a. Business process b. Radical redesign
29. Re-reengineering calls for a change in the performance measures:- the cost, quality,
efficiency, overheads, and many others.
a. True b. False
30. A ___ process in any area of the business organization performs basic steps such as, receive
input, measuring, analyzing, documenting, performing, process, record/storing, access, produce,
and communicating.
a. Value b. Decision making c. Business d. Re-engineering
31. A ___ is a measure, an intangible measure, which is difficult to count in clear terms.
a. Model b. Business c. Value
33. The number of steps in any business process related to the data search, its matching,
collecting, validating, confirming, and conforming are carried out in the redesigned process.
a. True b. False
34. ___ is the process of identifying a problem, developing alternative solutions, and choosing
and implementing.
a. Decision-making b. Business c. Value
35. Decision-making is a ___ activity.
a. Intuitive b. Cognitive c. Systematic d. Analytic
36. A ___ decision maker approaches a problem by structuring it and applying a well-defined
method to lead to a solution.
a. Intuitive b. Systematic c. Cognitive d. All the above
37. ___ systems are interactive information systems that assist a decision-maker in approaching
ill-structured problems by offering analytical models and access to database.
a. Decision making b. Systematic c. Cognitive d. Decision support systems
38. The components of DSS –
a. Data management subsystems b. Model management sub-system
c. Dialog management sub-system d. All of the above
39. ___ systems help to analyze historical and current data either on-demand or periodically.
b. Data analysis system
40. A ___ is the actual system that a manager works with during the decision process.
a. Specific DSS b. DSS generators c. DSS tools
41. True or False –
a. Formal sources provide information in a less structured way.
b. Informal sources provide information in a relatively organized and predictable fashion.
A. a & b true B. a & b False C. a – true, b – false D. b – true, a – false
43. ___, ___, and society need to use a variety of systems to organize the collection, storage,
processing, retrieval, and communication of information.
a. Management, society c. Individuals, organizations
44. MIS is both an area of ___ and a ___ of scholarly inquiry.
a. Design, diagnosis b. Practice, discipline c. Evaluation, implementation
46. True or False –
a. At the highest level, managers are concerned with supervising the conduct of day-to-day
activities.
b. At the lowest level, managers are concerned with setting long-term goals and directions for the
organization.
A. Both are true B. Both are false ‘ C. A – true, b-false D. A – false, b – true
47. ___ managers who act as project managers might be responsible for one or more unique
protects and ___ managers supervise teams of workers who must accomplish a specific goal.
a. Middle, project b. Project, middle c. Top, middle d. Top, project
48. ___ refers to taking actions that direct and motivate employees to accomplish personal and
organizational goals.
___ establishing a formal reporting structure and a system of accountability among workers.
a. Organizing, leading b. Planning, controlling c. Leading, organizing
49. Operations can encompass ___.
a. Only manufacturing b. Manufacturing and the provision of services
50. ___ refers to the deployment, development, assessment, rewarding, and management of
individual organizational members and worker groups.
___is the management of raw materials, partially completed goods service.
b. Human resource management, Inventory control.
Download