0% found this document useful (0 votes)
59 views55 pages

Management Information Systems

This document provides information about management information systems in 3 sentences: It defines management information systems as computer-based tools that people use to work with information and support organizational information processing needs. It also discusses key components of MIS like inputs, outputs, feedback mechanisms, and how information systems can facilitate functions like supply chain management and communication. The document seeks to test the reader's understanding of MIS concepts through multiple choice questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views55 pages

Management Information Systems

This document provides information about management information systems in 3 sentences: It defines management information systems as computer-based tools that people use to work with information and support organizational information processing needs. It also discusses key components of MIS like inputs, outputs, feedback mechanisms, and how information systems can facilitate functions like supply chain management and communication. The document seeks to test the reader's understanding of MIS concepts through multiple choice questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

MOST POPULAR AROUND THE WORLD

SUCCESS

PRACTICE BOOK» NOT FOR SALE


SERIES

MANAGEMENT INFORMATION SYSTEMS


BOOST YOUR COMMERCE KNOWLEDGE

DESIGNED FOR SURE SUCCESS


MCQ EDITION
NARAYAN CHANGDER

+ S
7 0 ON
4 TI RS
ES WE
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2

Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.

JAI SHREE RAM

NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:

PRACTICE BOOK» NOT FOR SALE


my guiding light, my shining star,
forever

It is my deepest gratitude and warmest


affection that I dedicate this Ebook.

To my mother JOYTSNA CHANGDER


who could not see this Ebook.

who has been a constant source of Knowledge and in-


spiration. Mom, Covid did not take you, it took our
many dreams. wherever you are we will meet again.
Disclaimer

The aim of this publication is to sup-


ply information taken from sources be-
lieved to be valid, reliable and authen-
ticate. The author bear no responsibil-
ity for any damage arising from inad-
verent omissions, negligence or inac-
curacies (typographical or factual) that

NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.

nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:

PRACTICE BOOK» NOT FOR SALE


1. If you require practice sets on various sub-
jects, kindly send us a message on Facebook
with the subject name. Our team will be happy
to create them for you. Message us on Face-
book at https://www.facebook.com/
narayanchangder
2. Additionally, you can access all of my books
with answers on Google Play Books at »>
https://play.google.com/store/books/
author?id=Narayan+Changder
3. Answers are given at the end of every page
to help you identify your strengths and weak-
nesses.
4. It shows you how to build your own techni-
cal and pedagogical skills to enable them to
create their own materials and activities for
students.
5. It helps you to see how you can make the
transition from classroom teaching to blended
and online teaching.
6. It’s the cheapest good quality ebook that you
can buy online on google play books.

NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents

1 MANAGEMENT INFORMATION SYSTEMS . . . . . . . . . . . . 2


1.1 MANAGEMENT INFORMATION SYSTEMS . . . . . . . . . . . . . . . . . . . . . 2
1. MANAGEMENT INFORMATION

NARAYAN CHANGDER
SYSTEMS

1.1 MANAGEMENT INFORMATION SYSTEMS


1. In a system, raw materials energy and la- most useful to you:audio, text, video, an-
bor are considered: imation, graphical or others, as well as if
it is free of errors.
A. Input
A. Timeliness
B. Output
B. Location
C. Handle
C. Form
D. Feedback mechanism
D. Validity
2. According to network range, which net-
5. In unit testing, a test step describes the
work has the smallest range:LAN; WAN;
needed part of the code for a test case to
MAN; INTERNET
be executed. Which of the following is its
A. MAN example?
B. WAN A. User cannot sign up to the system us-
C. Internet ing invalid email.
B. User can run the code.
D. LAN
C. 1. User inputs number “1”. 2. Press
3. Information systems can facilitate supply [Enter] key.
chain management by:
D. <email address><password>
A. Tracking the status of orders. E. Prompt “Hello Passenger, please sign
B. Rapidly communicating orders. in using your email”.
C. Providing product specifications. 6. Which device is the input device:
D. all of the above A. RAM

4. In defining information quality, this is a B. ROM


check if the information is in a structure C. Printer

1. A 2. D 3. D 4. C 5. C 6. D
1.1 MANAGEMENT INFORMATION SYSTEMS 3

D. Scanner C. Backup server data or server data in-


tegrity
7. input subsystem of the Marketing Informa-

PRACTICE BOOK» NOT FOR SALE


D. Connect to virtual server
tion System
A. Transaction processing system, Mar- 12. Any computer-based tool that people use
keting research subsystem, Marketing in- to work with information and support
telligence subsystem the information-processing needs of the
org/business.
B. Accounting information system, mar-
keting research subsystem, marketing in- A. Information
telligence subsystem B. People
C. SIA, marketing intelligence, marketing C. Technology
research
D. none of above
D. All True
13. devices that you can use to feed data into
8. Question 8:The operating systems of Ap- a computer to be processed by software
ple, Google and Microsoft are: applications.
A. IOS, Window, Android A. Output
B. IOS, Android, Window B. Input
C. Window, IOS, Android C. Software
D. Android, Window, IOS D. End user

9. Indicate which device is considered the 14. is a discipline that promotes an inte-
“brain” of the computer: grated approach to identifying, capturing,
evaluating, retrieving, and sharing all of
A. RAM an enterprise’s information assets.
B. ROM A. Knowledge Management
C. VGA B. Database Management
D. CPU C. System Management
10. is the mortar that holds all the func- D. Information Technology
tional systems together. 15. In MIS which place is economically sound
A. Storage and logically in development process?
B. System A. Information
C. Database B. Data
D. Memory C. Statements
D. Data flow
11. Application server virtualization technol-
ogy to: 16. Factors affecting the implementation of
A. Create multiple virtual servers from CRM applications in customer care
one physical server A. Fear of change
B. Create multiple virtual servers from B. Not properly aware of CRM or low
logical servers knowledge of information technology

7. D 8. B 9. D 10. C 11. A 12. C 13. B 14. A 15. D 16. D


1.1 MANAGEMENT INFORMATION SYSTEMS 4

C. Weak financial resources 23. During a parallel operation implementa-


D. All right tion, the old system is turned off and the
new system is turned on
17. All of the following are considered “stake-
A. true
holders” of the Management Information
System except: B. false
A. Employees
24. A group of interrelated components, with
B. System Designers a clearly defined boundary, working to-

NARAYAN CHANGDER
C. Suppliers gether toward a common goal by accept-
D. Competitors ing inputs and producing outputs in an or-
ganized transformation process is
18. A common law trademark is an R inside a
A. Software
circle.
B. System
A. true
B. false C. Information system tools
D. Extranet
19. ROM is the acronym:
A. Random Only Memory 25. Unstructured decisions require judgement,
B. Random Only Management evaluation, and insight to solve the prob-
lem.
C. Read Only Management
D. Read Only Memory A. true
B. false
20. Six sigma aims to solve defects and delays
within a company’s business process. 26. Information systems in businesses serve
A. True which levels:
B. False A. Operational level
21. An enterprise information systems (EIS) B. Managers
can be used to increase business produc- C. Strategic level
tivity and increase service cycles, product
development cycles, and marketing life cy- D. All right
cles.
27. Which of the following statements repre-
A. TRUE sents dependency:
B. FALSE
A. The company’s revenue depends on
22. Which of the following individuals typi- consumer tastes
cally have less formal, advanced educa- B. If the company’s products are of poor
tional degrees and tend to process rather quality, the sales department cannot sell
than create information? them
A. Knowledge workers
C. Businesses need to cooperate with
B. Chief Executives each other to survive in an integrated
C. System analysts economy
D. Data operators D. All of the above

17. D 18. B 19. D 20. A 21. B 22. D 23. B 24. B 25. A 26. D 27. D 28. B
1.1 MANAGEMENT INFORMATION SYSTEMS 5

28. Transaction Processing Systems are used C. Is obtained from the US copyright of-
to record business meetings. fice

PRACTICE BOOK» NOT FOR SALE


A. True D. All of the above
B. False 34. PKI stands for?
29. Which type of database model allows A. public key infrastructure
for more complex relationships between B. private key infrastructure
records?
C. public key instance
A. Hierarchical database model D. private key instance
B. Network database model
35. is technology that uses a multidimen-
C. Object-oriented database model sional view of aggregate data to provide
D. Relational database model quick access to strategic information for
further analysis.
30. Beta testing gives copies of the unfinished
A. SQL
code to outside testers for feedback.
B. Data mining
A. True
C. OLAP
B. False
D. Databases
31. Of the following information systems,
which system is considered the base sys- 36. Collaborative CRM is often used in busi-
tem of other systems: ness models
A. TPS A. Business to Business (B2B)

B. MIS B. Business to Customer (B2C)


C. Customer to Customer (C2C)
C. ESS
D. All is incorrect
D. DSS
37. Direction of information flow wherein the
32. What are the advantages of using a
flow is between business units and work
relational database management system
teams.
(RDBMS)?
A. Upward
A. Unreliable data retrieval, lack of scala-
bility, and high risk of data loss B. Downward
B. High cost, complex implementation, C. Horizontal
and low data integrity D. Outward/Inward
C. Limited data storage, slow data re- 38. improve the performance of a business
trieval, and lack of data security process, which of the following is most rel-
D. Data integrity, data security, efficient evant?
data retrieval, and scalability A. 1. Input.
33. A registered copyright: B. 2. Processing.
A. Adds additional legal protection C. 3. All of the above.
B. Should be obtained for commercially D. 4. Control and feedback
distributed work E. 5. Output

29. B 30. A 31. A 32. D 33. D 34. A 35. C 36. A 37. C 38. D 39. A
1.1 MANAGEMENT INFORMATION SYSTEMS 6

39. Who Creates Data? 44. cloud computing is


A. Business A. provides the ability to run multiple op-
erating systems on a single machine
B. Information
B. a computing model in which process-
C. Internet ing, storage and other activities are pro-
D. Computers vided by the internet
C. connecting various computers located
40. How does a decision support system (DSS)

NARAYAN CHANGDER
in geographically distant locations
differ from a management information sys-
tem (MIS)? D. none of above

A. DSS provides information for manage- 45. Question 10:A. Microsoft is the world’s
rial activities, while MIS focuses on pro- largest software manufacturer.B. Apple
viding interactive support for decision- is a famous American computer and con-
making tasks. sumer electronics company.C. Google is
the most popular search engine in the
B. DSS and MIS both focus on providing
Western world.
information for managerial activities.
A. A and C are correct
C. DSS provides interactive support for
decision-making tasks, while MIS focuses B. A, B and C are all correct
on providing information for managerial C. A, B and C are all wrong
activities.
D. A and B are correct
D. DSS and MIS both provide interactive
support for decision-making tasks. 46. CRM application must meet the following
basic functions:
41. Privacy is the ability to control information A. Internal communications
about oneself.
B. Manage customer information & Man-
A. true age customer history
B. false C. Send automatic emails to customers
D. All right
42. -SANS doesn’t Connect multiple storage
devices on dedicated network 47. Quantitative data reflects:
A. False A. The scale of the phenomenon
B. True B. Mass of the phenomenon
C. The greater or lesser degree of the
43. A hacker locks out users and encrypts their phenomenon
personal computer files and data, holding
it hostage until they agree to pay to the D. All of the above ideas
attacker. What is this practice called? 48. Sample of commercial Data base
A. Browser hijacker A. Amazon.com
B. Ransomware B. mobile legends
C. Brute-force C. Tiktok App
D. none of above D. None

40. C 41. A 42. A 43. B 44. B 45. B 46. D 47. D 48. A 49. B
1.1 MANAGEMENT INFORMATION SYSTEMS 7

49. Reactive puts emphasis on customer satis- 55. The role of Management Information Sys-
faction by focusing on preventing mistakes tems is to
from occurring.

PRACTICE BOOK» NOT FOR SALE


A. Document technology processes
A. True
B. Make it easier for employees to per-
B. False form their job duties
50. Marketing intelligence subsystem collects C. Assist managers with identifying and
information from solving problems
A. internal and marketing environment D. Provide digital technologies to busi-
B. marketing environment nesses
C. internal company 56. 7) Information management is?
D. none of above A. Information which is collected, stored,
51. Which function does not belong to the Fi- organized and analysed.
nance and Accounting (F&A) information B. Data which is unanalysed facts such as
system? volume of sales, level of cost or number of
A. Debt settlement customer.
B. Financial statements C. Data which is shown any things to the
C. Working capital management user in a raw data.

D. Finding customers D. Information about everything need in


case management.
52. In the , information systems are used
to help plan the delivery of goods and ser- 57. The sales process of an in-store sales sys-
vices. tem includes 4 steps a, b, c, d as fol-
A. business magazines lows. Which activities do not belong to
the store’s sales system?
B. advertising brochures
A. Find products in stock
C. transportation industry
B. Determine customer purchasing re-
D. manufacturing factories
quirements
53. Executive support systems C. Check the goods before purchasing
A. Support senior management D. Print payment receipt
B. Address non-routine decisions
58. Trademarks identify a source of goods are
C. Incorporate data about external
services with:
events
D. Include all levels of management A. Words, Phrases, Logos, Shapes, or
Surnames
54. The information is:
B. Words, Phrases, Geographic terms,
A. The data has been processed Shapes, or Slogans
B. What brings understanding to people C. Words, Phrases, Logos, Shapes, or Slo-
C. What people perceive about the world gans
around them D. Words, Phrases, Logos, Ornamental,
D. All ideas are correct or Slogans

50. B 51. D 52. C 53. A 53. B 53. C 54. D 55. C 56. A 57. C 58. C
1.1 MANAGEMENT INFORMATION SYSTEMS 8

59. Financial Statements in an information sys- 64. The information must be presented in such
tem are included in what section? a way that it should address the informa-
A. Input tion requirements of the target user.
B. Process A. TRUE
C. Output B. FALSE
D. Data
65. Question 5:Microsoft dominates the PC
60. Based on the application of technologies and desktop operating system and produc-

NARAYAN CHANGDER
across businesses to optimize organiza- tivity software market, but what problem
tional and customer characteristics is the does it struggle with?
characteristic of CRM type?
A. Smartphone hardware and software,
A. Collaborative CRM (Collaborative mobile computing, cloud-based software
CRM) applications, and even gaming consoles
B. CRM Strategy (Strategy CRM) and software
C. Operate CRM (Operational CRM) B. Cloud-based software applications
D. Analytical CRM (Analytical CRM) C. Game software
61. A new software has a few unrecognized D. Smartphone hardware and software,
and untested components; the develop- mobile computing
ers want to test all components as a
workaround. 66. Regression testing notifies developers
A. Unit Testing when bugs are created due to new imple-
mentations.
B. Integration Testing
C. System Testing A. True
D. Stress Testing B. False
E. Beta Testing
67. Which one of these cannot be taken as a
62. The Antivirus maintained system integrity primary key?
for about 98% of the time A. ID
A. Conformance
B. registration no
B. Reliability
C. Department ID
C. Durability
D. Street
D. Perceived Quality
E. Special Features 68. Projections and responses to queries are
63. IT infrastructure consists of Information output characteristics associ-
ated with
A. Hardware
A. TPS
B. Software
C. Data B. MIS

D. Business culture & politics C. DSS


E. Network and telecommunication D. ESS

59. C 60. A 61. A 62. B 63. A 63. B 63. C 63. E 64. A 65. A 66. A 67. D 68. D
1.1 MANAGEMENT INFORMATION SYSTEMS 9

69. It continuously transforming the tradi- E. Upon movement of the fixes to produc-
tional business world such as emergence tion, proper authentications are given to
of clout computing, the growth of mobile the users depending on their roles and

PRACTICE BOOK» NOT FOR SALE


digital business platform based on smart- profiles.
phones and tablet computers, Big Data,
and business analytics, and the use of so- 73. Data sampling and analysis involves se-
cial networks by managers to achieve busi- lecting a representative sample of data
ness objectives. from different sources and systems and
analyzing it to identify errors, inconsisten-
A. New Business Models cies, and other quality issues.
B. E-commerce expanding A. True
C. Management changes B. False
D. IT Innovation
74. Which one of the following is Cloud Plat-
70. acts as a mediator or middle layer be- form by Amazon?
tween the user and the hardware. A. Azure
A. System software B. AWS
B. software C. Cloudera
C. hardware D. All of the mentioned
D. end user 75. If you were collecting and storing informa-
71. The “C” word in SCM terminology is: tion about your music collection, an album
would be considered a/an
A. chain
A. Relation
B. contain
B. Instance
C. customer
C. Entity
D. counter
D. Attribute
72. Analyze is a six-sigma methodology that 76. Managers utilize a S.W.O.T analysis to re-
identifies the key causes and process de- view what four qualities when making de-
terminants. Which of the following scenar- cisions?
ios encompasses this process?
A. Strengths, weaknesses, opportunities,
A. The stakeholders of the company gath- and treats
ered all the issues from all the business
processes to check areas for improve- B. Strengths, weaknesses, opportunities,
ment for the upcoming implementation. and threats

B. During implementation, all steps are C. Strengths, worries, opportunities, and


described in knowledge documents. threats

C. The issues and concerns were investi- D. Strategies, weaknesses, opportuni-


gated to find the root cause. ties, and threats

D. After knowing the root cause of the is- 77. a collection of hardware, software,
sues, solutions are generated and perma- data, people, and procedures that work to-
nent fixes are applied. gether to produce quality information.

69. D 70. A 71. A 72. C 73. A 74. B 75. C 76. B 77. B


1.1 MANAGEMENT INFORMATION SYSTEMS 10

A. Information Technology 83. Control is a six-sigma methodology that


B. Information System holds the gains/value of the project.
Which of the following scenarios encom-
C. Network passes this process?
D. Database A. The stakeholders of the company gath-
ered all the issues from all the business
78. An author controls what can be done with processes to check areas for improve-
a copyrighted work, including all of the fol- ment for the upcoming implementation.

NARAYAN CHANGDER
lowing except for
B. During implementation, all steps are
A. Who can make copies described in knowledge documents.
B. Who can perform the work C. The issues and concerns were investi-
C. Who can display the work gated to find the root cause.
D. Who can purchase the work D. After knowing the root cause of the is-
sues, solutions are generated and perma-
79. Facebook entire existence depends on the nent fixes are applied.
use of information technology and informa- E. Upon movement of the fixes to produc-
tion systems. tion, proper authentications are given to
A. TRUE the users depending on their roles and
profiles.
B. FALSE
84. Explain the role of information security
80. Integration testing test individual compo-
management in protecting organizational
nents if they work or fail.
data.
A. True A. It is only responsible for protecting
B. False data from external threats
B. It only focuses on physical security,
81. What is the purpose of a relational
not data security
database model?
C. It has no role in protecting organiza-
A. To organize data in a hierarchical
tional data
structure
D. It implements policies, procedures,
B. To store and manage semi-structured and technologies to prevent unauthorized
or unstructured data access, use, disclosure, disruption, modi-
C. To define the structure, relationships, fication, or destruction of data.
and rules for organizing and storing data
85. The Management Information System con-
D. To extend the relational model to sup- sists of all the following tools EXCEPT:
port complex data types
A. Transaction Processing System
82. Which device is the input device: B. Management Information System
A. RAM C. Decision Support System
B. ROM D. Software Development System
C. CPU 86. Six sigma started at the General Electric
D. Keyboard company in the mid-1980s.

78. D 79. A 80. B 81. C 82. D 83. E 84. D 85. D 86. B 87. B
1.1 MANAGEMENT INFORMATION SYSTEMS 11

A. True 91. Activity includes in IS


B. False

PRACTICE BOOK» NOT FOR SALE


87. Business firm:collection of business and
routine
A. False
A. x:processy:outputz:feedbackt:input
B. True
B. x:outputy:feedbackz:inputt:process
88. Treat others as you would like others to
C. x:inputy:processz:outputt:feedback
treat you
A. Utilitarian principle D. x:feedbacky:inputz:processt:output

B. Golden Rule 92. transmission line or a type of cable made


C. Risk Aversion Principle of glass fiber or fine plastic that can trans-
mit light signals from one place to another
D. No Free Lunch Rule
A. Coaxial Cable
89. which of the following individuals typically
B. Fiber Optic Cable
have less formal, advanced educational de-
grees and tend to process rather than cre- C. wireless
ate information? D. infra red
A. Knowledge workers
93. Data entry, management, security, and
B. Executive
quality metrics are typically included in an
C. Data workers information quality standard.
D. System analyst A. True
90. Improve is a six-sigma methodology that B. False
establishes a prediction model and opti-
mizes performance. Which of the follow- 94. The abbreviation CIO term:
ing scenarios encompasses this process? A. Chief Information Officer
A. The stakeholders of the company gath- B. Chief Internet Officer
ered all the issues from all the business
C. Chief International Officer
processes to check areas for improve-
ment for the upcoming implementation. D. Chief Idicator Officer
B. During implementation, all steps are 95. What is the purpose of a document
described in knowledge documents. database model?
C. The issues and concerns were investi-
A. To organize data in a hierarchical
gated to find the root cause.
structure
D. After knowing the root cause of the is-
B. To store and manage semi-structured
sues, solutions are generated and perma-
or unstructured data
nent fixes are applied.
E. Upon movement of the fixes to produc- C. To define the structure, relationships,
tion, proper authentications are given to and rules for organizing and storing data
the users depending on their roles and D. To extend the relational model to sup-
profiles. port complex data types

88. B 89. C 90. D 91. C 92. B 93. A 94. A 95. B 96. C


1.1 MANAGEMENT INFORMATION SYSTEMS 12

96. We can use to keep track of student 101. Management information systems usu-
statistics. ally:
A. Office System A. Serve managers interested in weekly,
B. Payroll System monthly, and yearly results, not day-to-
day activities.
C. Student Information System
B. Help managers make decisions that
D. Learning Management System are unique, rapidly changing, and not eas-
ily specified in advance.

NARAYAN CHANGDER
97. Most important of all organiza-
tional/business resources as they set C. Provide managers with a generalized
goals, carry out tasks, make decisions, computing and telecommunications ca-
serve customers, provide reliable tech en- pacity that can be applied to a changing
vironment so the org/business can run array of problems.
smoothly. D. Perform and record the daily routine
A. Information transactions necessary to the conduct of
business.
B. People
C. Technology 102. Management information systems (MIS)
is, Choose the correct answer
D. none of above
A. 1. create and share documents that
98. According to network range, which net- support day-to-day office activities
work has the smallest range:LAN; WAN; B. 2. process business transactions (e.g.,
MAN; INTERNET time cards, payments, orders, etc.)
A. MAN C. 3. capture and reproduce the knowl-
B. WAN edge of an expert problem solver
C. LAN D. 4. use the transaction data to produce
information needed by managers to run
D. Internet the business
99. This is the scope of activities in which it is E. 5. none of the above
limited for viewing or accessing any mod-
103. In an enterprise, the work of the strate-
ule of a system.
gic level is:
A. Subsystems
A. Sales Manager
B. System Boundaries
B. Inventory management
C. Subsystem Interface C. Analyze data by region
D. System Environment D. Profit plan for the next 10 years or hu-
100. In defining information quality, this is man resources plan for the next 5 years
a check if information is from a credible 104. External functions of the Sales and Mar-
source. keting (S&M) information system:
A. Timeliness A. Advertisement
B. Location B. Customer identification
C. Form C. Sell products
D. Validity D. Check product quality

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 13

105. Strategic planning features (select all D. An employee saved a confidential in his
that apply): personal drive and opted to sell it to the
company’s competitors.

PRACTICE BOOK» NOT FOR SALE


A. Long-term, broad goals for the whole
company E. A software created in 2015 never had
updates that may include newer relevant
B. Short-term, specific goals for a spe-
fields.
cific department
110. The term EDI stands for:
106. Six Sigma is a quality program that
improves customers’ experience, lowers A. Electronic Data Interchange
costs, and builds better leaders. B. Ecommerce Data Internet
A. True C. Electronic Data Internet
B. False D. Ecommerce Database Interchange
111. One of the methods used to secure per-
107. Functions outside of the Manufacturing
sonal data in information systems
and Production (M&P) information system
A. identity management
A. Product assembly
B. wisdom of crowd
B. Materials planning
C. phishing
C. Check product quality
D. pharming
D. Sell products
112. In unit testing, a test data describes the
108. Processes make organizations more data being manipulated or tested. Which
and of the following is its example?
A. Organized, functional A. User cannot sign up to the system us-
B. Efficient, effective ing invalid email.
B. User can run the code.
C. Capable, competitive
C. 1. User inputs number “1”. 2. Press
D. Profitable, expensive
[Enter] key.
109. Data security breaches can compromise D. <email address><password>
the confidentiality, integrity, and avail- E. Prompt “Hello Passenger, please sign
ability of information, leading to potential in using your email”.
damage to the organization and its stake-
holders. Which following scenario is its ex- 113. Which device is the computer’s internal
ample? memory:
A. A customer typed in alphanumeric A. HDD
characters in the mobile number field. B. USB Flash
B. There are first name and surname C. Printer
fields in the accounts object, while there D. RAM
is only a full name field in the contacts ob-
ject. 114. MIS produces Information in qualitative
form not in quantitative form
C. The administrator only included data
from the Visayas and Luzon for national A. False
sales report generation. B. True

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 14

115. is a process used by companies to 120. An Enterprise Resource Program (ERP)


turn raw data into useful information. By utilizes a centralized database and is used
using software to look for patterns in to run an entire company.
large batches of data, businesses can learn A. true
more about their customers to develop
more effective marketing strategies, in- B. false
crease sales and decrease costs.
121. What are the key steps involved in the
A. Data warehouse system design phase of system analysis

NARAYAN CHANGDER
B. Data mining and design?
C. AI A. Identifying requirements, creating sys-
tem specifications, designing the architec-
D. Databases
ture, and creating prototypes
116. Of the four implementation methodolo- B. Hiring the development team
gies, which is the most risky?
C. Testing the system
A. Direct cutover
D. Writing the user manual
B. Pilot implementation
C. Methodical operation 122. Summary transaction data, high-volume
data, and simple models are information
D. Phased implementation inputs characteristic of
117. Software are programs that run on the A. DSS
hardware.
B. TPS
A. TRUE
C. MIS
B. FALSE
D. ESS
118. It is a characteristic of information in
which information may not all be displayed 123. External data is:
in the system but it should only contain A. Collect from outside
minimum detail that is appropriate to the B. Collected from state information
user. providers.
A. Timeliness C. Collected from information providers
B. Appropriateness of independent non-governmental organi-
C. Accuracy zations.
D. Conciseness D. All of the above.

119. It deals with the coordination and use 124. It is a set of instructions that tell the com-
of three very important organizational puter how to take data in, how to process,
resources-information, people and technol- how to display information, and how to
ogy. store data and information.
A. Maintenance Information Systems A. Hardware
B. Management Integrative Systems B. Software
C. Management Information Systems C. Procedures
D. Management Informative Systems D. Processor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 15

125. Component includes in IS (can pick more 129. All of the features of the new software
than 1 answer) were tested at once to ensure that all com-
ponents are working properly.

PRACTICE BOOK» NOT FOR SALE


A. hardware
A. Unit Testing
B. software
B. Integration Testing
C. databases
C. System Testing
D. network
D. Stress Testing
E. reuters
E. Beta Testing
126. New Apple watches are selling fast re-
gardless of the lack of testing and expert 130. ATM to allow the clients to withdraw
reviews. money and other automated means to de-
posit money.
A. Conformance
A. TRUE
B. Reliability
B. FALSE
C. Durability
131. tactical planning is a function of
D. Perceived Quality
A. top management
E. Serviceability
B. middle management
127. Which of the following are examples of C. low management
an input device?
D. operational

A. 132. This is data that has a particular meaning


within a specific context.
A. Data
B. Information
B.
C. Business Intelligence
D. none of above
133. The characteristics for goos Information
C. (can pick more than 1 answer)
A. Punishment
B. Accessible
C. Timely
D.
D. Relevant
E. Punctual
128. The type of CRM used to operate 134. Explain the difference between struc-
A. Operation CRM tured analysis and object-oriented analy-
sis in system analysis and design.
B. Strategic CRM
A. Structured analysis focuses on user in-
C. Analytic CRM terface design, while object-oriented anal-
D. Collaboration CRM ysis focuses on database management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 16

B. Structured analysis focuses on indi- 139. In which SDLC phase, the software pro-
vidual components, while object-oriented gram developed in the previous phase is
analysis focuses on the overall system put through a series of structured tests to
identify bugs, errors and problems.
C. Structured analysis focuses on pro-
cesses and data flow, while object- A. Planning
oriented analysis focuses on modeling B. Testing
real-world objects and their interactions.
C. Implementation
D. Structured analysis focuses on hard-

NARAYAN CHANGDER
ware, while object-oriented analysis fo- D. Maintenance
cuses on software 140. Industry-specific standards are specific
internally to the information technology
135. Batch processing is preferred over on-line
service industry.
transaction processing when i) processing
efficiency is important ii) the volume of A. True
data to be processed is large iii) only peri- B. False
odic processing is needed
141. Organizations that do not protect PII can
A. i, ii
face penalties, lawsuits, and loss of busi-
B. i, iii ness.
C. ii, iii A. true
D. i, ii, iii B. false

136. SDLC is sometimes referred to as the 142. Information system serving operational
waterfall methodology because it is com- level:
pleted one step at a time. A. ESS
A. true B. MIS
B. false C. DSS
D. TPS
137. Firewalls are to protect against
A. Virus Attacks 143. Information is critical when making deci-
sions.
B. Fire Attacks
A. TRUE
C. Data Driven Attacks
B. FALSE
D. Unauthorized Attacks
144. Which of the following are examples of
138. What is a Pivot Table in excel? an output device?
A. Its a table where you can perform mul-
tiple calculations regarding a defined data A.
B. Is a function to help excel performing
fast operations
C. All are correct B.
D. None are correct

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 17

150. To ensure security for an organizational


network system, it is necessary to have:
C.

PRACTICE BOOK» NOT FOR SALE


A. Firewall
B. Router
C. Switch
D.
D. Server

151. Which of the following best describes the


145. What is the purpose of a hierarchical main objective of ‘Ethical Hacking’?
database model?
A. To gain unauthorized access to com-
A. To organize data in a hierarchical
puter systems and steal sensitive informa-
structure
tion
B. To store and manage semi-structured
or unstructured data B. To use hacking techniques to disrupt
computer networks
C. To define the structure, relationships,
and rules for organizing and storing data C. To identify vulnerabilities in computer
D. To establish relationships between en- systems and improve their security
tities D. To create viruses and other malicious
software for personal gain
146. The network has a large scope linking re-
gions and countries, including smaller net-
works combined together: 152. Prototype is a

A. MAN A. Working model of existing system


B. LAN B. Model of new system
C. Internet C. Mini model of proposed system
D. WAN
D. None of above
147. Unit is a generic term for smaller pieces
of code. 153. On the evening news, you heard the re-
A. True porter talking about an Internet threat
called a ‘Botnet’. What exactly is a Bot-
B. False net?
148. The information must be relevant to the A. A group of computers running mali-
recipient. cious programs that are remotely con-
A. TRUE trolled by cybercriminals.
B. FALSE B. A new type of cyber virus spread from
China causing havoc around the globe.
149. Information and MIS give a competitive
advantage that makes a business more C. It is a malicious program that attempts
profitable than its competitors. to hide itself, other files, or computer data
A. TRUE so they cannot be found on a computer.
B. FALSE D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 18

154. The term is used to refer a row 159. helps to monitor performance, track
A. Record activities of competitors, identify opportu-
nities, and forecast trends. They also as-
B. Primary key sist senior managers
C. Foreign key
A. TPS
D. Field
B. ESS
155. Increasing variability is the key to under-
standing Six Sigma. C. Expert System

NARAYAN CHANGDER
A. True D. Data analytics
B. False
160. It is changing how firms design, produce,
156. Data errors can occur due to mistakes and deliver their products and services.
made during data entry, data manipula-
A. IT innovation
tion, or data transmission. Which follow-
ing scenario is its example? B. New Business Models
A. A customer typed in alphanumeric C. E-commerce expanding
characters in the mobile number field.
D. Management changes
B. There are first name and surname
fields in the accounts object, while there 161. Type of CRM used for planning
is only a full name field in the contacts ob-
ject. A. Strategic CRM
C. The administrator only included data B. Analytic CRM
from the Visayas and Luzon for national
C. Collaboration CRM
sales report generation.
D. An employee saved a confidential in his D. Operation CRM
personal drive and opted to sell it to the
company’s competitors. 162. Direction of information flow wherein the
flow is from and to customers, suppli-
E. A software created in 2015 never had ers, distributors, and other partners of the
updates that may include newer relevant business.
fields.
A. Upward
157. Most common reason for failure of large
projects is due to Organizational and polit- B. Downward
ical resistance to change C. Horizontal
A. False
D. Outward/Inward
B. True
163. Information in a classified enterprise
158. Modem/router
does not include information:
A. Input device
A. Strategy
B. Output device
C. Storage device B. Manage

D. CPU C. Operational
E. Telecommunications device D. Tactic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 19

164. When people know when to apply tech- 170. Enterprise Resource Planning (ERPs) sup-
nology port:
A. Manufacturing processes.

PRACTICE BOOK» NOT FOR SALE


A. Technology literacy
B. Information literacy B. Financial and accounting processes.
C. Ethics C. Human resource processes.
D. All of the above.
D. none of above
171. Organizatioal culture is Encompasses set
165. A process is a series of tasks that are of assumptions that define goal only
completed in order to accomplish a goal.
A. False
A. true
B. True
B. false
172. The enterprise information systems (EIS)
166. Which device is the computer’s external would spend all of its time gathering data
memory: from systems all over the world with us-
ing the centralized data warehouse.
A. Monitor
A. TRUE
B. ROM
B. FALSE
C. Printer
173. The software has a help desk to accom-
D. HDD
modate the queries and concerns of clients.
167. Information systems become bound up in A. Conformance
organizational politics because they influ- B. Reliability
ence don’t access to a key resource
C. Durability
A. True
D. Perceived Quality
B. False E. Serviceability
168. Fair Use allows copyrighted work to be 174. All below are the approaches to IS, EX-
used under all of the following conditions CEPT
except: A. Analysis approaches
A. Nonprofit educational use B. Technical approaches
B. Parody C. Behavioral approaches
C. Commercial Purposes D. Sociotechnical
D. Quotations 175. Which of the following is the best expla-
nation of business process reengineering?
169. Consider attributes ID, CITY and NAME.
which one of these can be considered as a A. Redesigning the organizational struc-
primary key? ture of a business

A. NAME B. Redesigning workflow


C. Redesigning products
B. ID
D. Transformation of business processes
C. CITY for more effective achievement of busi-
D. ID, NAME ness goals

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 20

176. CRM Manages firm’s relationships with decision making and control in an organi-
suppliers zation
A. True B. A set of interrelated information that
B. False collect (or retrieve), process, store, and
distribute components to support decision
177. Acceptance testing includes formal verifi- making and control in an organization
cation of requirements. C. A set of interrelated system that col-
A. True lect (or retrieve), product, and distribute

NARAYAN CHANGDER
B. False information to support decision making
and control in an organization
178. Data obsolescence can happen when in- D. A set of interrelated components that
formation becomes outdated or irrelevant, collect (or retrieve), process, store, and
leading to incorrect or outdated decisions. distribute information to support decision
Which following scenario is its example? making and control in an organization
A. A customer typed in alphanumeric
characters in the mobile number field. 181. Reasons why the marketing field re-
quires information systems, except
B. There are first name and surname
fields in the accounts object, while there A. High level of competition
is only a full name field in the contacts ob- B. Varied products
ject.
C. Information Technology Discovery
C. The administrator only included data
D. There is a marketing mix
from the Visayas and Luzon for national
sales report generation. 182. An information system can be defined as
D. An employee saved a confidential in his a set of interrelated components. The pur-
personal drive and opted to sell it to the pose is to collect, process, store and dis-
company’s competitors. tribute information to support businesses
E. A software created in 2015 never had in:
updates that may include newer relevant A. Communication between departments
fields. B. Create new products and services
179. help users to interactively sort, sub- C. Make decision
divide, combine, and organize data while
D. Analyze and process data
it is in its graphical form by transforming
figures and raw data into visual objects 183. Information system serving strategic
A. Statistical Model level:
B. Forecasting Model A. ESS
C. Predictive analysis B. MIS
D. Data Visualisation System C. DSS

180. So, what is Information Systems (IS)? D. TPS

A. A set of interrelated part of informa- 184. What is the purpose of system analysis
tion that collect (or retrieve), process, in the context of system analysis and de-
store, and distribute systems to support sign?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 21

A. To examine a business situation for the C. Marketing


purpose of developing a system solution D. All of the above
or devising improvements.

PRACTICE BOOK» NOT FOR SALE


190. The attribute refers to a of a table
B. To create a marketing plan for a new
product A. Record
C. To analyze the weather patterns in a B. Foreign key
specific region C. Primary key
D. To design a new logo for the company D. Field
185. Brains of computer 191. Three activities in an information system:
A. Input device A. Input, output and feedback
B. Output device B. Input, processing and output
C. Storage device C. Data analysis, retrieval, and feedback
D. CPU D. Research, analyze and process data
E. Telecommunications device 192. Making customers aware of the product
belongs to what functional areas?
186. Usefulness of MIS is reduced in the com-
pany if Information is not shared A. Manufacturing and Production
B. Sales and Marketing
A. True
C. Finance and accounting
B. False
D. Human Resources
187. If a university sets up a web-based infor-
mation system that faculty could access to 193. Quality refers to a set of guidelines or re-
record student grades and to advise stu- quirements that an organization or product
dents, that would be an example of should meet.
A. CRM A. True

B. ERP B. False

C. Intranet 194. Direction of information flow wherein


strategies, goals, directives from higher
D. Extranet
levels are passed to lower levels.
188. Which of the following is NOT considered A. Upward
to be a form of artificial intelligence? B. Downward
A. Virtual Reality C. Horizontal
B. Robotics D. Outward/Inward
C. Machine Learning
195. Which of the following can be used to
D. Understand human language forecast future trends?
189. Functional areas of IS(Information Sys- A. Office Automation Systems
tem) in Business B. Transaction Processing System
A. Accounting C. Executive Support System
B. Manufacturing D. Decision Support System

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 22

196. In unit testing, a test case describes 201. Which of the following metrics best de-
the individual functionality/feature of the scribes the six sigma concept?
software that is being tested. Which of A. Reduces dependency on “Tribal Knowl-
the following is its example? edge”.
A. User cannot sign up to the system us- B. Provides a disciplined approach to
ing invalid email. problem-solving.
B. User can run the code. C. Attacks the high-hanging fruit (the

NARAYAN CHANGDER
C. 1. User inputs number “1”. 2. Press hard stuff).
[Enter] key. D. Creates a competitive advantage (or
D. <email address><password> disadvantage).

E. Prompt “Hello Passenger, please sign E. Improves profits.


in using your email”. 202. Data inconsistency can happen when in-
formation is not consistent across differ-
197. Which is NOT an IQA measure?
ent sources or systems, leading to con-
A. Data management fusion and potentially incorrect decisions.
Which following scenario is its example?
B. Data quality audits
A. A customer typed in alphanumeric
C. Data cleansing
characters in the mobile number field.
D. Data governance B. There are first name and surname
fields in the accounts object, while there
198. A GPS feature was added to the system
is only a full name field in the contacts ob-
as requested by the clientele.
ject.
A. Conformance C. The administrator only included data
B. Reliability from the Visayas and Luzon for national
sales report generation.
C. Durability
D. An employee saved a confidential in his
D. Perceived Quality personal drive and opted to sell it to the
E. Special Features company’s competitors.
E. A software created in 2015 never had
199. Decision Support Systems cannot be un- updates that may include newer relevant
structured or semi-structured. fields.
A. true
203. It is type of Information System which is
B. false the most widely used information system
that records collected data at the bound-
200. In public-key cryptosystem which is kept aries of organizations.
as public?
A. Transaction Processing System
A. Decryption keys
B. Supply Chain Management System
B. Encryption keys
C. Customer Relationship Management
C. Encryption & Decryption keys System
D. None of the above D. Business Intelligence Systems

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 23

204. is an augmentation in Knowledge. marketing, and human resources are func-


A. Information tions

PRACTICE BOOK» NOT FOR SALE


A. Enterprise Systems Firms (ERP)
B. Data
B. Supply Chain Management System
C. System
(SCM)
D. none of above
C. Customer Relationship Management
205. Information systems that monitor the ele- (CRM) System
mentary activities and transactions of the D. Knowledge Management System
organizations are: (KMS)
A. Management-level system 210. Operating system enables businesses to
B. Operational-level system process and analyze large amounts of
C. Knowledge-level system data.

D. Strategic level system A. TRUE


B. FALSE
206. Structured decisions occur when stan-
dardized processes can be put in place to 211. It integrates business processes in man-
handle specific situations. ufacturing and production, finance and ac-
counting, sales and marketing, and human
A. true
resources into a single software system.
B. false
A. Enterprise Resource Planning
207. What is the purpose of a network B. Integration and Information
database model? C. Business Process
A. To organize data in a hierarchical D. Management Information Systems
structure
B. To store and manage semi-structured 212. Question 2:In 2022, what revenue will
or unstructured data Google achieve?

C. To define the structure, relationships, A. $432.47 billion


and rules for organizing and storing data B. $324.74 billion
D. To establish more complex relation- C. $224.47 billion
ships between records D. $132.76 billion
208. Data that contains meaning/significance 213. Enterprise information systems (EIS) do
so that it can be used to make appropriate not monitor and aggregate data from all
decisions aspects of the enterprise.
A. Database A. TRUE
B. Client B. FALSE
C. Information
214. Information originating from within a
D. Transaction business or organization is:

209. Integrating manufacturing and produc- A. Strategy


tion, finance and accounting, sales and B. Manage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 24

C. Operational 220. It deals with behavioral issues, as well


D. All of the above as technical issues surrounding the devel-
opment, use, and impact of information
215. Decision support systems systems used by managers and employees
in a firm.
A. Serve middle management
A. Database Management System
B. Support non-routine decision making
B. Management Information System
C. May use external information as well
C. Database Information System

NARAYAN CHANGDER
TPS / MIS data
D. Management System
D. Support senior management
221. It refers to the connection of each system
216. In which phase of the system develop- or subsystem boundaries and serves as
ment process, specifications for a solution the connection to display the output from
that fulfills the business requirements is one system to the input of another system.
undertaken and the technical blueprint is
designed A. System Boundaries

A. feasibility analysis B. Subsystem Interface


C. System Environment
B. system designed
D. System Feedback
C. system implementation
D. System Analysis 222. What is a database?
A. A collection of structured information
217. The experiences of IT and IS, stored electronically
A. IT-e-commerceIS-Consumer devices B. A server that receives requests and
B. IT-SoftwareIS-student records gives responses
C. IT-procedureIS-process C. A table that stores data in rows and
columns
D. IT-managerIS-duty manager
D. A computer system that stores data
218. External functions of the Human and Re-
223. The GPS feature not only points to the
source (H&R) information system
location of the user but also reveals the
A. Manage employee information nearby users using the same application.
B. Evaluation, reward, discipline A. Conformance
C. Employee recruitment plan B. Reliability
D. Search for potential customers C. Durability
D. Perceived Quality
219. To improve the performance of a business
process, which of the following is most rel- E. Special Features
evant? 224. Prototype is a
A. Input A. Working model of existing system
B. Process B. Mini model of existing system
C. Output C. Mini model of process system
D. Feedback and control D. None of the above on

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 25

225. NIC stands for: 231. refers broadly to a computer-based sys-


A. Network International Control tem that provides managers with the tools
for organizing, evaluating, and efficiently

PRACTICE BOOK» NOT FOR SALE


B. Network Interface Control running their departments.
C. Network International Cards A. MANAGEMENT INFORMATION SYS-
D. Network Interface Cards TEM
B. Software
226. Business Information Technology align-
ment is concerned with using information C. Hardware
technology to effectively achieve business D. End user
goals.
A. TRUE 232. Sales representatives use IS(Information
System) to
B. FALSE
A. advertise products
227. A human data operator can be bypassed B. Communicate with customers
for basic data entry when using a(n).
C. analyses sales trends
A. Office automation system
D. All of the above
B. Management information system
C. Transaction processing system 233. What is a primary key in a database man-
agement system?
D. Decision support system
A. The last record added to the table
228. Which is NOT included in the Six Sigma
B. A common value shared by multiple
Methodology?
records
A. Differentiate
C. A random number assigned to each
B. Verify record
C. Design D. A unique identifier for each record in a
D. Measure table

E. Define 234. All of the following are implementation


methodologies EXCEPT for:
229. Automatic Teller Machines (ATMs) are
good examples of online Transaction Pro- A. Direct cutover
cessing Systems. B. Pilot implementation
A. True C. Methodical operation
B. False D. Phased implementation
230. SAN is a device: 235. In management information systems,
A. Storage business knowledge-Business Intelligent
is understood as:
B. Server
A. Data, information, descriptions, or
C. Virtual server skills acquired through practical business
D. VOIP experience or through education.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 26

B. Business understanding of customers, 241. What are the benefits of using databases
competitors, partners, and business in hospitals?
schools. A. Centralized storage of patient data
C. Brainpower and social progress are B. Enforcement of data integrity
applied in business.
C. Efficient data retrieval
D. All of the above.
D. All of the above
236. Information systems that monitor the ele-

NARAYAN CHANGDER
mentary activities and transactions of the 242. is the general transformation cycle
organizations are for information?

A. Management level system A. data to information to knowledge.

B. Operational level system B. data to knowledge to information

C. Knowledge level system C. knowledge to data to information.


D. information to data to knowledge
D. Strategic level system
243. RAM is the acronym:
237. These are the raw facts that describe a
particular phenomenon. A. Random Assitance Memory
A. Data B. Random Asset Memory
B. Information C. Read Access Memory
C. Business Intelligence D. Random Access Memory
D. none of above 244. Advantages of having effective informa-
tion management strategies include:(KK2)
238. TPS components include:
A. it allows for organisations to collect
A. Users & technology large amounts of data about their cus-
B. Data tomers.
C. Procedures and processes B. Can be time consuming and costly to
implement.
D. All right
C. Legal obligations and legislations must
239. A large enterprise usually acquires their be factored into documentation or a busi-
data systems as needs occur over short pe- ness may risk their reputation.
riods of times.
D. none of above
A. TRUE
245. Information quality audits can be con-
B. FALSE
ducted internally by the organization’s
240. To create a data table in the database, staff, or externally by an independent
use SQL commands third party.

A. Create A. True

B. Grant B. False

C. Insert 246. Qualitative data reflects:


D. Alter A. Nature of the phenomenon

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 27

B. Popularity of the phenomenon A. A computer-generated simulation of a


C. Comparative relationship of phenom- three-dimensional environment

PRACTICE BOOK» NOT FOR SALE


ena B. A user interface that allows for inter-
action with the virtual environment
D. All ideas are correct
C. The use of physical objects to enhace
247. These are devices that execute program the sense of immersion
instructions and process data accordingly.
D. The ability to manipulate physical ob-
A. System software jects in the real world
B. PROCESSING DEVICES 252. Which is not included in the Competitive
C. hardware Forces Model by Porter
D. input A. customer
B. newcomers
248. The term EDI refers to:
C. substitute products
A. Electronic data exchange
D. employee
B. Customer relationship management
C. Supplier relationship management 253. Six sigma was popularized by the Mo-
torola company CEO Jack Welch.
D. Inventory management
A. True
249. It is a set of instructions, data, or pro- B. False
grams used to operate a computer and ex-
ecute specific tasks. In simpler terms, soft- 254. Benefits of management information sys-
ware tells a computer how to function tems
A. MANAGEMENT INFORMATION SYS- A. timbul asimetris informasi
TEM B. disintermediasi
B. Software C. increase searching cost
C. Hardware D. increase market entry costs
D. End user 255. substitutes customers might use if your
250. You are on a business trip and sitting in quality become too high
the local cafe trying to send emails to your A. True
colleagues to catch up on a few tasks.To B. False
protect your communications over these
public networks you should always do the 256. Measure is a six-sigma methodology that
following: identifies key product characteristics &
process parameters, understands the pro-
A. Find the strongest WiFi signal near you
cess, and measures performance. Which of
B. Turn off your file sharing the following scenarios encompasses this
C. Use a Virtual Private Network (VPN) process?
D. none of above A. The stakeholders of the company gath-
ered all the issues from all the business
251. Which of the following is NOT a charac- processes to check areas for improve-
teristic of Virtual Reality? ment for the upcoming implementation.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 28

B. During implementation, all steps are 261. An information system that supports the
described in knowledge documents. planning and assessment needs of execu-
tive management is
C. The issues and concerns were investi-
gated to find the root cause. A. GDSS
D. After knowing the root cause of the is- B. TPS
sues, solutions are generated and perma- C. ERP
nent fixes are applied.
D. None of them

NARAYAN CHANGDER
E. Upon movement of the fixes to produc-
tion, proper authentications are given to 262. Sales Projections and responses to
the users depending on their roles and queries are information output character-
profiles. istics associated with a(n):
A. DSS
257. It is not necessary for technology employ-
ees to possess business skills. B. MIS
C. OAS
A. true
D. TPS
B. false
263. Which software is not a database man-
258. A warranty of 10 years is given to the agement system:
customers of an appliance manufacturer.
A. Java
A. Conformance
B. MySQL
B. Reliability C. SQL Server
C. Durability D. Postgresql
D. Perceived Quality
264. Creative Commons is a non-profit organi-
E. Serviceability zation that provides legal tools for artists
and authors.
259. Direction of information flow wherein
A. true
daily transactions are from the lower level
to a higher level until it reaches the top. B. false
A. Upward 265. Software systems created and updated
B. Downward by a community of users and royalty-free
are software that:
C. Horizontal
A. Open source code
D. Outward/Inward
B. Closed source code
260. A system that works for Senior Manage- C. Microsoft
ment D. MacOS
A. Transaction Processing Systems
266. Operational excellence seeks to improve
B. Management Information systems the operations of the business.
C. Decision Support Systems A. TRUE
D. Executive Support Systems B. FALSE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 29

267. The purpose of using a Decision Tree is: B. *Identifying the management that is
A. To describe the processing content to needed for efficient decision making in or-
ganizations

PRACTICE BOOK» NOT FOR SALE


readers in a concise, complete, and easy-
to-understand manner C. Identifying the information that is
B. To prove that DFD matches reality needed for effective decision making in or-
ganizations
C. To clearly analyze the decisive factors
D. *Identifying the information that is
that lead to choosing appropriate actions
needed for user acceptance in organiza-
D. To describe the complex control struc- tions
ture of processing
273. 11) Razwel work as a clark for the ship-
268. data analysis process and can be used to ping agencies. In order to write a letter for
predict future behavior and direct decision the shipment provider, what application is
making. the best fit for him?
A. data warehouse A. MS Office Word
B. data mining B. MS Office Excel
C. data web C. MS Office Power point
D. all wrong D. MS Office Access

269. Intellectual property is property that de- 274. Market power of suppliers when firm can
rives from the work of the mind or intel- raise as fast as suppliers
lect. A. False
A. true B. True
B. false 275. W3C stands for ?
270. What are the uses of databases in orga- A. World Wide Web Consortium
nizations? B. World Wide Web Collaboration
A. Storing details about criminals C. World Wide Web Community
B. Storing details about pupils D. None of the mentioned
C. Storing details about patients
276. Data incompleteness occurs when impor-
D. All of the above tant information is missing from a dataset,
leading to incomplete or inaccurate anal-
271. Correct statements related to ERP (Enter-
ysis and decisions. Which following sce-
prise Resources Planning), except
nario is its example?
A. Employee Relationship Management
A. A customer typed in alphanumeric
B. Customer Relationship Management characters in the mobile number field.
C. Supply Chain Management B. There are first name and surname
D. Activity Based Management fields in the accounts object, while there
is only a full name field in the contacts ob-
272. Define Management Information System ject.
(MIS) C. The administrator only included data
A. *Identifying the system that is needed from the Visayas and Luzon for national
for effective conclusion in organizations sales report generation.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 30

D. An employee saved a confidential in his C. Green Hat Hacker


personal drive and opted to sell it to the D. Grey Hat Hacker
company’s competitors.
E. A software created in 2015 never had 282. The most common form of organizational
updates that may include newer relevant change enabled by Information Technology
fields. A. automation
B. Business process redesign (BPR)
277. CPU stands for:

NARAYAN CHANGDER
C. Rationalization
A. Central Protocol Unit
D. Paradigm shift
B. Control Processing Unit
C. Control Protocol Unit 283. Interviews and surveys are information
quality audit methods that aim to gather
D. Central Processing Unit
feedback and information about the qual-
278. Question 3:What makes Apple’s mobile ity of data and systems.
phone products always different in the A. True
market compared to other phone brands? B. False
A. Good quality and affordable price
284. A prototype version of the software was
B. There are many new features being up- tested by selected users prior to the imple-
dated all the time mentation.
C. There is a separate operating system A. Integration Testing
IOS
B. System Testing
D. The product has high configuration and
C. Stress Testing
large capacity
D. Beta Testing
279. IaaS is a component that talks about:
E. Acceptance Testing
A. Foundation in cloud computing
285. 9) Sheila works as a account assistant
B. Online database
in the Chicken Rice Shop company, she
C. Open source software or web server has told by her boss to record the amount
service of selling in the computer, which program
D. Infrastructure in cloud computing meet Sheila’s task?
A. MS Office Power Point
280. What sources of information do compa-
nies use to collect NORA data B. VBA Database System
C. MS Office Access
A. Social media posts
D. MS Office Excel
B. Clickstream
C. Arrest records 286. Enterprise systems
D. All of the above A. Collects data from different firm func-
tions and stores data in single central
281. What are the types of Hackers? data repository
A. Black Hat Hacker B. Resolves problem of fragmented data
B. White Hat Hacker C. Coordination of daily activities

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 31

D. Help managers make decisions about 291. Internal data is:


daily operations and longer-term planning A. Collect in business

PRACTICE BOOK» NOT FOR SALE


287. Bitrix24 is a software system written B. Collected from state information agen-
by: cies
A. PHP language and MySQL database C. Acquired from market survey compa-
B. Python language and MySQL database nies

C. Language.Net D. All of the above.

D. PHP language and SQL Server 292. Which of the following applications does
database not specialize in customer care and man-
agement:
288. It is a software that allows an organiza-
A. Bitrix24
tion to collect and manage data efficiently
in which it acts as an interface between B. Getfly
data resources and application programs. C. SalesForce
A. Database System D. SharePoint
B. Management Information System
293. Marketing research subsystem
C. Integration system
A. Collects all kinds of information, but
D. Database Management System most of the activities are aimed at the de-
velopment of the company’s environment
289. Collaboration technologies can be classi-
fied in terms of whether they support in- B. Collecting all kinds of information, but
teractions at the same or different time or most of the activities are aimed at com-
place or whether these interactions are re- petitors, governments
mote or co-located. C. Collects all kinds of information, but
most activities are aimed at customers
and potential customers.
D. none of above

294. What do MIS professionals do?


A. Bridge the gap between technology
and technical aspect
B. Bridge the gap between business and
A. True
technical minds
B. False
C. Bridge the gap between business and
290. In determining data needs for CRM, reg- technology purposes
ular daily transaction data is used D. Bridge the gap between technical view
A. Operational CRM (Operational CRM) and business information
B. Strategic CRM (Strategic CRM) 295. What does the degree of excellence of a
C. Collaborative CRM (Collaborative product or service indicate?
CRM) A. Cost
D. Analytical CRM B. Level

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 32

C. Value 301. One of the problems in data processing


D. Quality in traditional environments is data redun-
dancy, namely,
296. the purpose of management information A. presence of double data
systems is
B. data inconsistency
A. collect information
C. data loss
B. distribute information D. all wrong

NARAYAN CHANGDER
C. decision making
302. Which type of database model stores and
D. all true manages semi-structured or unstructured
data?
297. Public-key cryptography is also known
as? A. Hierarchical database model
A. asymmetric cryptography B. Network database model
B. symmetric cryptography C. Object-oriented database model

C. Both A and B D. Document database model

D. None of the above 303. Organizations can’t influence their envi-


ronments
298. The Systems Development Life Cycle
A. True
(SDLC) features all of the following EX-
CEPT: B. False
A. Structured 304. The use of Internet technologies to work
B. For the Risk Averse and empower business processes, elec-
tronic commerce, and enterprise collab-
C. Designed to Manage Large Projects oration within a company and with its
D. Interactive customers, suppliers, and other business
stakeholders.
299. It is a component of the system which is
A. E-commerce
an information or data that a user adds
into the system. B. E-business
A. Input C. Information System
B. Processing D. None of above
C. Output 305. Patents last 50 years and then become
D. Feedback part of the public domain.
A. true
300. Which one of the following is NOT an ex-
B. false
ample of data
A. RM10 306. What are the key components of a deci-
sion support system (DSS)?
B. Girl
A. Financial management, human re-
C. Boy source management, marketing manage-
D. The boy received RM10 ment, and operations management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 33

B. Data management, model manage- C. Decision support system involve more


ment, user interface, and knowledge man- complex software system the analyse ar-
agement range of input and provide a likely out-

PRACTICE BOOK» NOT FOR SALE


C. Hardware management, software come if certain decision made.
management, network management, and D. Expert Systems (or artificial intelli-
security management gence) are system that mimic human
D. Data analysis, data visualization, data thinking in the sense that they can analyse
storage, and data security a problem and learn from experiences.

307. Standard is the ability of a product or 311. Managing cash accounts belongs to what
service to consistently meet or exceed cus- functional areas?
tomer expectations. A. Manufacturing and Production
A. True B. Sales and Marketing
B. False C. Finance and Accounting
308. Which of the following describes an ERP D. Human Resources
system?
312. The network is limited to a certain dis-
A. ERP systems provide a foundation for tance, usually within 1 or a few buildings
collaboration between departments very close together
B. ERP systems enable people in differ- A. WAN
ent business areas to communicate
B. MAN
C. ERP systems have been widely
adopted in large organisations to store C. Internet
critical knowledge used to make the deci- D. LAN
sions that drive the organisation’s perfor-
mance 313. a system that provides reports on the
D. All of the above company’s latest performance based on
data from Transaction processing systems
309. Which device is the output device: and functions for middle management
A. RAM A. Transaction processing systems
B. Keyboard B. Management Information Systems
C. CPU C. Decision Support Systems
D. Monitor D. Executive Support Systems

310. 8) Management information system can 314. The document listing all procedure and
be characterized in 4 ways, which is true regulations that generally govern an orga-
except? nization is the
A. Transaction processing systems docu- A. Administrative policy manuall
ment the exchange of goods and services.
B. Personal policy book
B. Accounting information systems are
C. Procedures log
designed to collect, organize and summa-
rize data that is use in management D. Organization manual

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 34

315. A field of science and technology based on 320. Business entities exist to make profits.
disciplines such as computer science, biol- A. TRUE
ogy, psychology, linguistics, mathematics,
and engineering is known as B. FALSE
A. Artificial Intelligence 321. Which of the following metrics best fits
B. NanoTechnology the six sigma methodology?
C. Robotics A. Is a more sensitive indicator than a
percentage or average-based metric.

NARAYAN CHANGDER
D. Virtual Reality
B. Establishes a common metric to make
316. Which type of database model allows for
comparisons easier.
the storage of objects in a database?
C. Even one defect reflects a failure in
A. Hierarchical database model
your customer’s eyes.
B. Network database model
D. It focuses on defects.
C. Object-oriented database model
D. Relational database model 322. Organizations and environments have a
triple relationship
317. is process for collecting and managing
A. False
data from varied sources to provide mean-
ingful business insights. And the process B. True
for collecting and managing data from var-
ied sources to provide meaningful business 323. Trademarks last as long as they are being
insights. used and defended by the company.
A. Operational database A. true
B. Data mining B. false
C. Data warehouse 324. Database servers store and retrieve
D. Databases large volumes of structured data on high
speed disk arrays.
318. Network coverage within a city:
A. TRUE
A. WAN
B. LAN B. FALSE

C. Internet 325. Mangers only need to make decisions


D. MAN when problems arise.
A. true
319. Based on the intelligent exploitation of
customer data and using it for future B. false
strategies is the characteristic of this type
of CRM? 326. Which applications are not part of the Of-
fice 365 toolkit:
A. Analytical CRM (Analytical CRM)
A. Skype for Business
B. CRM Strategy (Strategy CRM)
B. OneDrive
C. Operate CRM (Operational CRM)
D. Collaborative CRM (Collaborative C. MySQL hay SQL Server
CRM) D. All is incorrect

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 35

327. Devices on the network environment 333. Information is:(KK2)


communicate with each other through the A. the same as data
following protocol:

PRACTICE BOOK» NOT FOR SALE


B. manipulated and refined data
A. SMTP
C. meaningful and useful
B. FPT
D. comprehensible
C. HTTP
334. Internet hardware server market:Dell,
D. TCP/IP HP/Compaq except IBM
328. Businesses can be seen as collection A. True
of business processes B. False
A. True 335. In defining information quality, informa-
B. False tion is of no value to you if you can’t ac-
cess it.
329. System testing pushes the limit of the ap-
A. Timeliness
plication until it fails.
B. Location
A. True
C. Form
B. False
D. Validity
330. RJ45 cable
336. The results of “what-if” questions asked
A. Output device repeatedly to determine the impact of
B. Storage device changes in one or more variables on the
outcomes are called
C. CPU
A. Data modeling
D. Telecommunications device
B. Classification
E. Connecting device
C. Clustering
331. The four systems development method- D. Sensitivity Analysis
ologies are:
337. The three sides of the Quality Triangle
A. SDLC, RAD, Agile, Lean are:
B. SDLC, RAD, Iterative, and Lean A. Time, cost, and resources
C. SDLC, BAD, Agile, and Lean B. Quality, cost, and resources
D. SDLC, RAD, Iterative, and Phased C. Quality, time, and cost
332. A computer network in a city with high- D. Quality, time, and resources
speed data transfer that connects loca- 338. Which type of database model extends
tions such as schools, campuses, offices the relational model to support complex
and government. data types?
A. LAN A. Hierarchical database model
B. CAN B. Network database model
C. MAN C. Object-oriented database model
D. WAN D. Relational database model

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 36

339. Define is a six-sigma methodology that A. The process of organizing data in a


helps businesses to identify, prioritize, database to reduce redundancy and de-
and selects the right projects to implement. pendency.
Which of the following scenarios encom- B. The process of encrypting data in a
passes this process? database to make it more secure.
A. The stakeholders of the company gath- C. The process of randomly organizing
ered all the issues from all the business data in a database without any specific
processes to check areas for improve- rules or structure.

NARAYAN CHANGDER
ment for the upcoming implementation.
D. The process of increasing redundancy
B. During implementation, all steps are and dependency in a database to improve
described in knowledge documents. data integrity.
C. The issues and concerns were investi- 343. In unit testing, an expected result de-
gated to find the root cause. scribes the part of the code that describes
D. After knowing the root cause of the is- that the previous test case was successful.
sues, solutions are generated and perma- Which of the following is its example?
nent fixes are applied. A. User cannot sign up to the system us-
E. Upon movement of the fixes to produc- ing invalid email.
tion, proper authentications are given to B. User can run the code.
the users depending on their roles and
C. 1. User inputs number “1”. 2. Press
profiles.
[Enter] key.
340. In a management information system, a D. <email address><password>
company can find out how much revenue E. Prompt “Hello Passenger, please sign
it earns from the loyalty of certain cus- in using your email”.
tomers
A. Customer Relationship Management 344. NORA is the collection of data that is
used by private organizations to target
B. Partner Relationship Management consumers.
C. Employee Relationship Management A. true
D. Knowledge Management B. false

341. Which of the following six sigma method- 345. The flow of the Agile methodology is
ologies is the more important to improve and the design process is
the current capabilities of an existing pro- A. Structured, Methodical
cess?
B. Structured, Interactive
A. IDOV
C. Incremental, Iterative
B. DMADV D. Minimalist, Iterative
C. DMAIC
346. A trademark will be awarded even if it
D. None of the above. causes confusion with an existing trade-
mark
342. Explain the concept of normalization in
the context of database management sys- A. true
tems. B. false

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 37

347. The working version of the software was 353. Stress testing exercises the entire appli-
tested by the actual end users prior to the cation to make it fail.
implementation.

PRACTICE BOOK» NOT FOR SALE


A. True
A. Integration Testing B. False
B. System Testing
354. It refers to how work is organized, coor-
C. Stress Testing dinated, and focused on producing a valu-
D. Beta Testing able product or service.
E. Acceptance Testing A. Business System
B. Business Process
348. What is NOT a tool of Information Man-
agement C. Business Information System
A. Information Audit D. Organization
B. Information Mapping 355. In a LAN, the computer is responsible
C. Communication Audit for controlling print access and manag-
ing printer resources connected to the net-
D. Manual Audit work.
349. Rapid Application Development is used A. File Server
for smaller projects combines the steps of B. Workstation
SDLC into five phases.
C. Communication Server
A. true
D. Printer Server
B. false
356. Reducing variability is the key to under-
350. IT infrastructure components standing Six Sigma.
A. Computer hardware platforms A. True
B. Operating system platforms B. False
C. Enterprise software applications
357. Tools for collaboration and teamwork
D. all true
A. Wikis
351. Information is used for the following pur- B. E-mail and instant messaging
poses:
C. Virtual worlds
A. Manage
D. Collaboration and social business plat-
B. Measuring operational capacity forms
C. Make decision
358. The quality of your is a large part of
D. All of the above the quality of your information system.

352. A unique process does not set a business A. computer


apart from their competitors. B. decision
A. true C. time
B. false D. challenges

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 38

359. A set of acceptable behaviors for a pro- 364. Acquiring, training and retaining good
fessional or social group is known as: network which should be at top priority?
A. Morals A. Data entry
B. Values B. Lab incharge
C. Ethics C. Administrator
D. Laws D. System tester

NARAYAN CHANGDER
360. Question 6:Which three giants have been 365. Which of the following individuals typ-
competing to dominate customer experi- ically have less formal, advanced educa-
ence on the Internet? tional degrees and tend to process rather
than create information?
A. Microsoft, Chrome, Google
A. Knowledge workers
B. Google, Apple, Chrome
B. Executives
C. Apple, Google, Microsoft
C. System Analysts
D. Apple, Google, Chrome, Microsoft
D. Data workers
361. The following are the functions of a
DBMS except 366. Executive Support Systems help top-level
management to plan strategies.
A. Creating database
A. True
B. Processing data
B. False
C. Creating and processing forms
367. A Transaction Processing System differs
D. Administrating database
from a batch processing system in that it
362. It is a type of Information System that processes information in real time
uses artificial intelligence to be able to pre- A. true
serve the knowledge of an expert and to
B. false
solve problems.
A. Transaction Processing System 368. All of the following are steps in the busi-
ness planning process EXCEPT:
B. Supply Chain Management System
A. Gathering Information
C. Business Support System
B. Storing Information
D. Expert Support System
C. Using Information
363. It is a component of the system that D. Deleting Information
refers to the data or information that has
been processed and displayed to the end 369. Which of the four software development
users. methodologies is the most risky?
A. Input A. SDLC
B. Output B. RAD
C. Process C. Agile
D. Control D. Lean

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 39

370. What is the purpose of constraints in a 375. US policies favor consumers and are opt-
database? in; EU policies favor businesses and are
opt-out.

PRACTICE BOOK» NOT FOR SALE


A. To establish relationships between en-
tities A. true
B. To define rules and constraints that B. false
govern data behavior and integrity
376. What is a Management Information Sys-
C. To specify the types of operations that tem
can be performed on the data
A. A group of charts that together forms
D. To provide methods for querying and a book of knowledge
manipulating data
B. A group of components that provides
371. Which database model is widely used and managers with information to take deci-
based on the concept of tables? sions
A. Hierarchical database model C. A console to enhance the visuals of
B. Network database model games and phisical stores

C. Object-oriented database model D. Transitive processes that help drivers


to find the best route possible
D. Relational database model
377. The goals of customer relationship man-
372. Examples of functional business pro- agement (CRM) are:
cesses
A. All of the above ideas
A. Manufacturing and production
B. Improve customer satisfaction
B. Sales and marketing
C. Expand customers
C. Finance and accounting
D. Increase sales
D. Human resources
378. One of the challenges in using the inter-
373. Printer net is, there are which can identify vis-
A. Input device itors when browsing the internet,
B. Output device A. cookies
C. Storage device B. web bugs
D. CPU C. web beacons
E. Telecommunications device D. spyware

374. Decisions in which the decision maker 379. The company’s strategy is to maximize
must provide judgment, evaluation, and in- profits and cash flow without paying at-
sights into the problem definition would be tention to market growth
characterized as A. low cost
A. Structured B. product differentiation
B. Semi structured C. market niche
C. Unstructured D. strengthen customer and supplier fa-
D. None of them miliarity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 40

380. Knowledge Management System (KMS) 385. It is a characteristic of information in


works to which every information must be up to
date based on the requirements not too
A. Integrate manufacturing and produc-
early and not too for the end user.
tion, finance and accounting, sales and
marketing, and human resources A. Timeliness
B. Manage relationships with suppliers B. Accuracy

C. Coordination of all business processes C. Conciseness

NARAYAN CHANGDER
including sales, marketing and service D. Understandability
D. Manage the process for gathering and 386. The system resolves IP addresses into
applying knowledge and expertise corresponding domain names:
381. is an interactive and reliable A. DNS
computer-based decision-making system B. HTML
which uses both facts and heuristics to C. UML
solve complex decision-making problem
D. FTP
A. ESS
387. Who have concerned with tactical (short-
B. MIS
term) operational problems and decision
C. Expert system making?
D. None of above A. supervisors
B. middle managers
382. IT infrastructure Set of physical devices
only required to operate enterprise C. executive managers

A. True D. both A & b

B. False 388. It is a stable, formal social structure that


takes resources from the environment and
383. Which quantity is the smallest unit processes them to produce outputs.
of measurement among the remaining A. Business
units:MB; KB; GB; TB
B. Organization
A. MB
C. Management
B. TB
D. Human Resources
C. GB
389. Full form of AI
D. KB
A. Artificial information
384. Correct statements regarding “process” B. Artificial intelligence
in information systems
C. Artificial integration
A. Data D. Advance Infographics
B. Database
390. Assembling a product, identifying cus-
C. Informasi tomers and hiring employees are ?
D. Income Statement A. Transactions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 41

B. Phases 395. In Microsoft’s Office 365, which applica-


C. Business process tions are used for managing and exchang-
ing internal information:

PRACTICE BOOK» NOT FOR SALE


D. Business functions
A. Bitrix24
391. Enterprise applications automate pro- B. Yammer
cesses that span multiple business func-
tions and organizational levels and may C. OneNote
extend outside the organization. D. CRM

396. Information technology enhances busi-


ness processes by:
A. Increasing efficiency of existing pro-
cesses
B. Enabling entirely new processes
C. Automating steps that were manual
D. Eliminate delays in decision making

397. Type of CRM used for collaboration be-


A. True tween CRMs
B. False A. Collaboration CRM
392. Six Sigma is equivalent to 3.4 defects per B. Strategic CRM
million opportunities. C. Analytic CRM
A. True D. Operation CRM
B. False
398. Six sigma is only compatible to the infor-
393. The Five Functions of Management are: mation service management industry.
A. Planning, Organizing, Staffing, Lead- A. True
ing, Controlling
B. False
B. Planning, Operating, Staffing, Leading,
Collecting 399. a set of rules and procedures that govern
the transmission of information between
C. People, Organizing, Staffing, Leading,
two points in a network.
Controlling
A. packet switching
D. Planning, Operating, Staffing, Leading,
Collecting B. protocol
C. router
394. A communication is said to be insecure
where data is transmitted in a manner that D. server
allows for interception also called?
400. system is a computer software used
A. attack to manage the creation and modification of
B. sniffing digital content
C. ISP A. CRM
D. citation B. ERP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 42

C. Content Management B. Management Information System


D. Cloud computing C. Transaction Processing System

401. The growth of corporate intranets, ex- D. Executive Support Systems


tranets, as well as the web, has acceler-
406. The enterprise information systems (EIS)
ated the development and use of execu-
tier consists of database servers, enter-
tive class information delivery and deci-
prise resource planning systems, and other
sion support software tools by lower lev-
legacy data sources.

NARAYAN CHANGDER
els of management and by individuals and
teams of business professionals. This dra- A. TRUE
matic expansion has opened the door to B. FALSE
the use of which of the following tool?
A. Business Intelligence 407. The 3 type of enterprise system is enter-
prise resources process (ERP), enterprise
B. Business Knowledge
analysing systems and customer relation-
C. Business Ideas ship management software.
D. Business Intelligence A. TRUE
402. Software consists of and types. B. FALSE
A. System software and Microsoft win- 408. When people can define what informa-
dows tion is needed, knows how and where to
B. Application software and system soft- obtain information, understands the infor-
ware mation, can act appropriately based on
this information.
C. Word processing and system software
A. Technology literacy
D. none of above B. Information literacy
C. Ethics
403. Decision Support Systems are used by
lower-level managers D. none of above
A. TRUE
409. Which level of leadership in the organiza-
B. FALSE tion is responsible for short-term planning
and controlling the company’s daily activi-
404. Connecting disparate storage devices ties?
over a high-speed network for storage is
a function A. Executive level
A. database B. Operational level
B. Storage area networks (SANs) C. Strategic level
C. hard disk D. Supervisory level
D. all wrong 410. Environments generally change as fast as
the Organizations
405. is used to help managers make right
decision in important areas of business. A. False
A. Decision Support System B. True

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 43

411. It is a characteristic of information in 417. *What does it take to succeed in MIS ca-
which information must be correct or pre- reers? (can pick more than 1 answer)
cise. A. Business skills

PRACTICE BOOK» NOT FOR SALE


A. Timeliness B. Soft skills
B. Appropriateness C. Technical skills
C. Accuracy D. Managering skills
D. Conciseness E. Teaching skills
412. What are the 3 main functions of CRM? 418. The developer tested all the components
A. Sales, Marketing, Customer services for all possible bugs or fixes to ensure that
it will be discovered prior to implementa-
B. Product, Marketing, Customer ser- tion.
vices
A. Integration Testing
C. Services, Marketing, Sales
B. System Testing
D. All is incorrect
C. Stress Testing
413. CRM Provides information to coordinate D. Beta Testing
all business processes related to
E. Acceptance Testing
A. company competitors
419. data that stores historical data and cur-
B. customer satisfaction rent data that have an impact on the inter-
C. company suppliers ests of decision makers
D. government A. data warehouse
414. fast followers:firms with size and re- B. data mining
souces to capitalize on that technology C. data web
A. False D. data mart
B. True 420. A new monitoring system was imple-
mented to complement the automation of
415. Is customer focus based on profitable cus-
an existing system.
tomer acquisition and retention character-
istic of this type of CRM? A. Unit Testing
A. CRM Strategy (Strategy CRM) B. Integration Testing
B. Operate CRM (Operational CRM) C. System Testing
C. Analytical CRM (Analytical CRM) D. Stress Testing

D. Collaborative CRM (Collaborative E. Beta Testing


CRM) 421. Efficiency of information strategy is mea-
sured by (KK8)
416. An enterprise information systems (EIS)
is any kind of information system which A. Ease of retrieval of information
improves the function of enterprise busi- B. Currency of files
ness processes by integration. C. Cost of operating the strategy and
A. TRUE speed of the strategy
B. FALSE D. Security of data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 44

422. Which of the following can provide reg- B. Location


ular information about the daily activities
C. Form
of a business to managers?
D. Validity
A. Decision Support System
B. Executive Support System 428. During a pilot implementation, problems
C. Transaction Processing System are contained to a small group of users.
D. Management Information System A. true

NARAYAN CHANGDER
423. The Lean methodology focuses on taking B. false
an initial idea and creating a “Minimum Vi-
able Product”. 429. Assembling a product, identifying cus-
tomers and hiring employees are
A. true
A. Transactions
B. false
B. Business model
424. A patent holder has the right to exclude
others from all of the following EXCEPT C. Business processes
for: D. Business Functions
A. Purchasing the invention
430. Type of CRM used to analyze data
B. Selling the invention
A. Analytic CRM
C. Manufacturing the invention
B. Strategic CRM
D. Importing the invention
C. Collaboration CRM
425. This type of attack is designed to hin-
der the normal operation of a website, or D. Operation CRM
other network resource.
431. Question 4:In 2009, since the emergence
A. DoS attack of the Internet, Apple’s revenue has in-
B. POS attack creased significantly and exceeded how
C. Phishing many billion USD?
D. none of above A. 60 billion USD

426. All of the following are potential MIS ca- B. 40 billion USD
reers except for: C. 50 billion USD
A. Systems Analyst D. 70 billion USD
B. Graphics Artist
432. The advantage of Enterprise Information
C. Operator
Systems (EIS) can be realized when organi-
D. Web Developer zations are able to utilize their capabilities
in order to exploit the technological possi-
427. In defining information quality, this is
bilities of the EIS in addition to their will-
how fast can you get access to the infor-
ingness to change their business routines.
mation as well as if the information is rel-
evant to current period. A. TRUE
A. Timeliness B. FALSE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 45

433. Successful collaboration requires an ap- 437. Poor quality input results poor quality
propriate organizational structure and cul- output
ture, along with appropriate collaboration

PRACTICE BOOK» NOT FOR SALE


A. False
technology.
B. True

438. Unit testing helps check if different sys-


tems can communicate.
A. True
B. False

439. All of the following are advantages a


company will receive when building their
A. True own software except:
B. False A. Scalability
B. Expensive
434. This refers to the people, organization,
and other systems that give and receive C. Competitive Edge
data from the system. D. Customized
A. System Boundaries 440. USB flash drive
B. Subsystems A. Input device
C. Subsystem Interface B. Output device
D. System Environment C. Storage device
D. CPU
435. Management information systems (MIS)
E. Telecommunications device
A. Development and share documents
that support day-today office activities. 441. It is a piece of computer hardware that
receives data from a computer and then
B. process business transactions (e.g., translates that data into another form.
time cards, payments, orders, capture
and reproduce the knowledge of an expert A. System software
problem solver B. output
C. use the transaction data to produce in- C. hardware
formation needed by managers to run the D. input
business
442. Customer numbers and their names
D. None of above
would be an example of the component
of an order management information sys-
436. NOS stands for:
tem.
A. Network Offical System A. software
B. Network Operation Support B. hardware
C. Network Offical Support C. data
D. Network Operation System D. procedure

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 46

443. What is WRONG definition of a Data? 448. Which of the following processes does
A. Data represent, conditions, ideas, or not belong to the company/enterprise:
objects. A. Resolve complaints
B. Data is created thru physical molding.
B. Sell
C. Data Driven by user demand.
C. Customer purchasing decisions
D. Data is limitless and present every-
where in the universe. D. Purchasing decisions of compa-

NARAYAN CHANGDER
nies/enterprises
444. Hardware is made up of the computers,
printers, networking devices, etc. 449. Which of the following statements is
A. TRUE MOST CORRECT?
B. FALSE A. The user may not be the buyer of goods
and services but the user of those goods
445. The two types of planning are:
and services.
A. Long-term, short-term
B. Customers are buyers of goods and
B. Broad, Specific
services
C. Operational, Specific
C. A user is a buyer of goods and services
D. Individualistic, Company-wide
D. All right
446. Information should be available when it
is needed. 450. The information must come from a not re-
A. TRUE liable source.
B. FALSE A. TRUE
447. Widening Scope of IS B. FALSE

451. An Enterprise Planning System (ERP) is


the integrated management of core busi-
ness processes with low cost of implemen-
tation and maintenance.
A. a:managerial controlb:institutional A. TRUE
core activitiesc:vendors, customers, be-
yond the enterprised:technical change B. FALSE
B. a:technical changeb:managerial
452. Information systems support an organi-
controlc:institutional core activi-
zation’s business operations, managerial
tiesd:vendors, customers, beyond the en-
decision making and strategic competitive
terprised
advantage. Such system is called
C. a:managerial controlb:technical
changec:vendors, customers, beyond the A. Business process reengineering
enterprised d:institutional core activities B. Globalization
D. a:vendors, customers, beyond the en-
C. Roles of information systems
terprised b:institutional core activities
c:technical changed:managerial control D. Competitive advantage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 47

453. a functioning system for operational staff B. Cloud Computing


and managers C. Soft Computing

PRACTICE BOOK» NOT FOR SALE


A. transaction processing systems D. Parallel Computing
B. management infomation systems
458. Which is NOT a part of managing imple-
C. decision support systems
mentation complexity?
D. executive support systems
A. Develop a working prototype
454. What are the common methods used for B. Track down the problem and fix it
authentication in information security man-
agement? C. Individual parts should be verified be-
fore being integrated with other parts
A. Common methods for authentication
include passwords, biometrics, security D. Integrated subsystems should also be
tokens, and multi-factor authentication. verified

B. Common methods for authentication 459. Which of the following is a common ex-
include retinal scans ample of a “phishing” attack?
C. Common methods for authentication A. You receive an email from an acquain-
include handwritten signatures tance with who you are rarely in contact
D. Common methods for authentication that contains only a web link.
include voice recognition B. You got an email that appears to be
from your bank asking you to enter your
455. Data is an individual unit that contains
account number and password, but the
raw material which does not carry any spe-
web address looks unfamiliar.
cific meaning.
C. You received a text message claiming
A. False
that you won a contest and asking you to
B. True click on the link.
456. Question 9:In fact, some analysts specu- D. All of the above
late that Google envisions
460. With Microsoft’s Azure cloud computing
A. A future where cell phones cost a frac- platform, we can:
tion of what they cost today
A. Rent a virtual server (VM) & install ap-
B. A future where mobile phones are free, plications
powered only by advertising revenue
B. Hosting
C. A future where mobile phones cost a
fraction of what they do today, or even C. Save web applications without renting
free, with just advertising revenue a server
D. A future where cell phones cost more D. All right
than they do today
461. SQL is
457. What type of computing technology A. System Query Language
refers to services and applications that
typically run on a distributed network B. Structured Query Language
through virtualized resources? C. Structured Query Location
A. Distributed Computing D. System Query Location

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 48

462. Involve the use of software tools to B. Output device


support communication, coordination, and
C. Storage device
collaboration among the members of net-
worked teams and workgroups. D. CPU
A. E-business E. Telecommunications device
B. OSS
468. The data is:
C. MSS
A. Useful information (data, documents,

NARAYAN CHANGDER
D. Enterprise collaboration system records) used to solve tasks is included in
the computer system
463. example of a relational DBMS
B. Information (data, documents,
A. MySQL
records) used to solve work.
B. SQL server
C. The information to be searched for
C. oracle database (data, documents, records) is used to
D. all true solve the job
D. Stored information (data, documents,
464. What are the five elements of the man-
records) used to solve work.
agement information system?
A. People, Software, Hardware, Data, 469. In unit testing, a pre-condition describes
Processes the prior part of the code needed for a test
B. Computers, People, Software, Data, case to be executed. Which of the follow-
Processes ing is its example?

C. People, Applications, Computers, A. User cannot sign up to the system us-


Data, Documents ing invalid email.
D. Software, Hardware, Data, Processes, B. User can run the code.
Companies C. 1. User inputs number “1”. 2. Press
[Enter] key.
465. When a bank offers web self-service for
customers to answer their questions, the D. <email address><password>
primary outcome is: E. Prompt “Hello Passenger, please sign
A. Adds value in using your email”.
B. Manages risks
470. This is collective information about your
C. Reduces Cost customers, your competitors, your busi-
D. Creates New Opportunity ness partners, your competitive environ-
ment and your own internal operations
466. First movers:devlope the disruptive tech- that give you the ability to make effective,
nologies important and often strategic decisions.
A. True A. Data
B. False B. Information
467. Mouse C. Business Intelligence
A. Input device D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 MANAGEMENT INFORMATION SYSTEMS 49

471. Materials converted into intermediate output information.


and finished products, and distributing the
A. MANAGEMENT INFORMATION SYS-
finished products to customers is

PRACTICE BOOK» NOT FOR SALE


TEM
A. Supply chain
B. Software
B. Production chain
C. Hardware
C. Primary chain
D. Distribution chain D. End user

472. Which type of database allows for the 474. Which of the following statements is
central storage of patient data? MOST CORRECT?
A. Relational database A. A customer is a buyer of goods and ser-
B. Hierarchical database vices but may not be a user
C. Network database B. Customers are buyers of goods and
D. Object-oriented database services
C. A user is a buyer of goods and services
473. It is the tangible components of a com-
puter system that you can use to input and D. All right

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS

You might also like