Management Information Systems
Management Information Systems
SUCCESS
+ S
7 0 ON
4 TI RS
ES WE
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2
Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.
NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:
NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.
nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:
NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents
NARAYAN CHANGDER
SYSTEMS
1. A 2. D 3. D 4. C 5. C 6. D
1.1 MANAGEMENT INFORMATION SYSTEMS 3
9. Indicate which device is considered the 14. is a discipline that promotes an inte-
“brain” of the computer: grated approach to identifying, capturing,
evaluating, retrieving, and sharing all of
A. RAM an enterprise’s information assets.
B. ROM A. Knowledge Management
C. VGA B. Database Management
D. CPU C. System Management
10. is the mortar that holds all the func- D. Information Technology
tional systems together. 15. In MIS which place is economically sound
A. Storage and logically in development process?
B. System A. Information
C. Database B. Data
D. Memory C. Statements
D. Data flow
11. Application server virtualization technol-
ogy to: 16. Factors affecting the implementation of
A. Create multiple virtual servers from CRM applications in customer care
one physical server A. Fear of change
B. Create multiple virtual servers from B. Not properly aware of CRM or low
logical servers knowledge of information technology
NARAYAN CHANGDER
C. Suppliers gether toward a common goal by accept-
D. Competitors ing inputs and producing outputs in an or-
ganized transformation process is
18. A common law trademark is an R inside a
A. Software
circle.
B. System
A. true
B. false C. Information system tools
D. Extranet
19. ROM is the acronym:
A. Random Only Memory 25. Unstructured decisions require judgement,
B. Random Only Management evaluation, and insight to solve the prob-
lem.
C. Read Only Management
D. Read Only Memory A. true
B. false
20. Six sigma aims to solve defects and delays
within a company’s business process. 26. Information systems in businesses serve
A. True which levels:
B. False A. Operational level
21. An enterprise information systems (EIS) B. Managers
can be used to increase business produc- C. Strategic level
tivity and increase service cycles, product
development cycles, and marketing life cy- D. All right
cles.
27. Which of the following statements repre-
A. TRUE sents dependency:
B. FALSE
A. The company’s revenue depends on
22. Which of the following individuals typi- consumer tastes
cally have less formal, advanced educa- B. If the company’s products are of poor
tional degrees and tend to process rather quality, the sales department cannot sell
than create information? them
A. Knowledge workers
C. Businesses need to cooperate with
B. Chief Executives each other to survive in an integrated
C. System analysts economy
D. Data operators D. All of the above
17. D 18. B 19. D 20. A 21. B 22. D 23. B 24. B 25. A 26. D 27. D 28. B
1.1 MANAGEMENT INFORMATION SYSTEMS 5
28. Transaction Processing Systems are used C. Is obtained from the US copyright of-
to record business meetings. fice
29. B 30. A 31. A 32. D 33. D 34. A 35. C 36. A 37. C 38. D 39. A
1.1 MANAGEMENT INFORMATION SYSTEMS 6
NARAYAN CHANGDER
in geographically distant locations
differ from a management information sys-
tem (MIS)? D. none of above
A. DSS provides information for manage- 45. Question 10:A. Microsoft is the world’s
rial activities, while MIS focuses on pro- largest software manufacturer.B. Apple
viding interactive support for decision- is a famous American computer and con-
making tasks. sumer electronics company.C. Google is
the most popular search engine in the
B. DSS and MIS both focus on providing
Western world.
information for managerial activities.
A. A and C are correct
C. DSS provides interactive support for
decision-making tasks, while MIS focuses B. A, B and C are all correct
on providing information for managerial C. A, B and C are all wrong
activities.
D. A and B are correct
D. DSS and MIS both provide interactive
support for decision-making tasks. 46. CRM application must meet the following
basic functions:
41. Privacy is the ability to control information A. Internal communications
about oneself.
B. Manage customer information & Man-
A. true age customer history
B. false C. Send automatic emails to customers
D. All right
42. -SANS doesn’t Connect multiple storage
devices on dedicated network 47. Quantitative data reflects:
A. False A. The scale of the phenomenon
B. True B. Mass of the phenomenon
C. The greater or lesser degree of the
43. A hacker locks out users and encrypts their phenomenon
personal computer files and data, holding
it hostage until they agree to pay to the D. All of the above ideas
attacker. What is this practice called? 48. Sample of commercial Data base
A. Browser hijacker A. Amazon.com
B. Ransomware B. mobile legends
C. Brute-force C. Tiktok App
D. none of above D. None
40. C 41. A 42. A 43. B 44. B 45. B 46. D 47. D 48. A 49. B
1.1 MANAGEMENT INFORMATION SYSTEMS 7
49. Reactive puts emphasis on customer satis- 55. The role of Management Information Sys-
faction by focusing on preventing mistakes tems is to
from occurring.
50. B 51. D 52. C 53. A 53. B 53. C 54. D 55. C 56. A 57. C 58. C
1.1 MANAGEMENT INFORMATION SYSTEMS 8
59. Financial Statements in an information sys- 64. The information must be presented in such
tem are included in what section? a way that it should address the informa-
A. Input tion requirements of the target user.
B. Process A. TRUE
C. Output B. FALSE
D. Data
65. Question 5:Microsoft dominates the PC
60. Based on the application of technologies and desktop operating system and produc-
NARAYAN CHANGDER
across businesses to optimize organiza- tivity software market, but what problem
tional and customer characteristics is the does it struggle with?
characteristic of CRM type?
A. Smartphone hardware and software,
A. Collaborative CRM (Collaborative mobile computing, cloud-based software
CRM) applications, and even gaming consoles
B. CRM Strategy (Strategy CRM) and software
C. Operate CRM (Operational CRM) B. Cloud-based software applications
D. Analytical CRM (Analytical CRM) C. Game software
61. A new software has a few unrecognized D. Smartphone hardware and software,
and untested components; the develop- mobile computing
ers want to test all components as a
workaround. 66. Regression testing notifies developers
A. Unit Testing when bugs are created due to new imple-
mentations.
B. Integration Testing
C. System Testing A. True
D. Stress Testing B. False
E. Beta Testing
67. Which one of these cannot be taken as a
62. The Antivirus maintained system integrity primary key?
for about 98% of the time A. ID
A. Conformance
B. registration no
B. Reliability
C. Department ID
C. Durability
D. Street
D. Perceived Quality
E. Special Features 68. Projections and responses to queries are
63. IT infrastructure consists of Information output characteristics associ-
ated with
A. Hardware
A. TPS
B. Software
C. Data B. MIS
59. C 60. A 61. A 62. B 63. A 63. B 63. C 63. E 64. A 65. A 66. A 67. D 68. D
1.1 MANAGEMENT INFORMATION SYSTEMS 9
69. It continuously transforming the tradi- E. Upon movement of the fixes to produc-
tional business world such as emergence tion, proper authentications are given to
of clout computing, the growth of mobile the users depending on their roles and
D. After knowing the root cause of the is- 77. a collection of hardware, software,
sues, solutions are generated and perma- data, people, and procedures that work to-
nent fixes are applied. gether to produce quality information.
NARAYAN CHANGDER
lowing except for
B. During implementation, all steps are
A. Who can make copies described in knowledge documents.
B. Who can perform the work C. The issues and concerns were investi-
C. Who can display the work gated to find the root cause.
D. Who can purchase the work D. After knowing the root cause of the is-
sues, solutions are generated and perma-
79. Facebook entire existence depends on the nent fixes are applied.
use of information technology and informa- E. Upon movement of the fixes to produc-
tion systems. tion, proper authentications are given to
A. TRUE the users depending on their roles and
profiles.
B. FALSE
84. Explain the role of information security
80. Integration testing test individual compo-
management in protecting organizational
nents if they work or fail.
data.
A. True A. It is only responsible for protecting
B. False data from external threats
B. It only focuses on physical security,
81. What is the purpose of a relational
not data security
database model?
C. It has no role in protecting organiza-
A. To organize data in a hierarchical
tional data
structure
D. It implements policies, procedures,
B. To store and manage semi-structured and technologies to prevent unauthorized
or unstructured data access, use, disclosure, disruption, modi-
C. To define the structure, relationships, fication, or destruction of data.
and rules for organizing and storing data
85. The Management Information System con-
D. To extend the relational model to sup- sists of all the following tools EXCEPT:
port complex data types
A. Transaction Processing System
82. Which device is the input device: B. Management Information System
A. RAM C. Decision Support System
B. ROM D. Software Development System
C. CPU 86. Six sigma started at the General Electric
D. Keyboard company in the mid-1980s.
78. D 79. A 80. B 81. C 82. D 83. E 84. D 85. D 86. B 87. B
1.1 MANAGEMENT INFORMATION SYSTEMS 11
96. We can use to keep track of student 101. Management information systems usu-
statistics. ally:
A. Office System A. Serve managers interested in weekly,
B. Payroll System monthly, and yearly results, not day-to-
day activities.
C. Student Information System
B. Help managers make decisions that
D. Learning Management System are unique, rapidly changing, and not eas-
ily specified in advance.
NARAYAN CHANGDER
97. Most important of all organiza-
tional/business resources as they set C. Provide managers with a generalized
goals, carry out tasks, make decisions, computing and telecommunications ca-
serve customers, provide reliable tech en- pacity that can be applied to a changing
vironment so the org/business can run array of problems.
smoothly. D. Perform and record the daily routine
A. Information transactions necessary to the conduct of
business.
B. People
C. Technology 102. Management information systems (MIS)
is, Choose the correct answer
D. none of above
A. 1. create and share documents that
98. According to network range, which net- support day-to-day office activities
work has the smallest range:LAN; WAN; B. 2. process business transactions (e.g.,
MAN; INTERNET time cards, payments, orders, etc.)
A. MAN C. 3. capture and reproduce the knowl-
B. WAN edge of an expert problem solver
C. LAN D. 4. use the transaction data to produce
information needed by managers to run
D. Internet the business
99. This is the scope of activities in which it is E. 5. none of the above
limited for viewing or accessing any mod-
103. In an enterprise, the work of the strate-
ule of a system.
gic level is:
A. Subsystems
A. Sales Manager
B. System Boundaries
B. Inventory management
C. Subsystem Interface C. Analyze data by region
D. System Environment D. Profit plan for the next 10 years or hu-
100. In defining information quality, this is man resources plan for the next 5 years
a check if information is from a credible 104. External functions of the Sales and Mar-
source. keting (S&M) information system:
A. Timeliness A. Advertisement
B. Location B. Customer identification
C. Form C. Sell products
D. Validity D. Check product quality
105. Strategic planning features (select all D. An employee saved a confidential in his
that apply): personal drive and opted to sell it to the
company’s competitors.
NARAYAN CHANGDER
B. Data mining and design?
C. AI A. Identifying requirements, creating sys-
tem specifications, designing the architec-
D. Databases
ture, and creating prototypes
116. Of the four implementation methodolo- B. Hiring the development team
gies, which is the most risky?
C. Testing the system
A. Direct cutover
D. Writing the user manual
B. Pilot implementation
C. Methodical operation 122. Summary transaction data, high-volume
data, and simple models are information
D. Phased implementation inputs characteristic of
117. Software are programs that run on the A. DSS
hardware.
B. TPS
A. TRUE
C. MIS
B. FALSE
D. ESS
118. It is a characteristic of information in
which information may not all be displayed 123. External data is:
in the system but it should only contain A. Collect from outside
minimum detail that is appropriate to the B. Collected from state information
user. providers.
A. Timeliness C. Collected from information providers
B. Appropriateness of independent non-governmental organi-
C. Accuracy zations.
D. Conciseness D. All of the above.
119. It deals with the coordination and use 124. It is a set of instructions that tell the com-
of three very important organizational puter how to take data in, how to process,
resources-information, people and technol- how to display information, and how to
ogy. store data and information.
A. Maintenance Information Systems A. Hardware
B. Management Integrative Systems B. Software
C. Management Information Systems C. Procedures
D. Management Informative Systems D. Processor
125. Component includes in IS (can pick more 129. All of the features of the new software
than 1 answer) were tested at once to ensure that all com-
ponents are working properly.
B. Structured analysis focuses on indi- 139. In which SDLC phase, the software pro-
vidual components, while object-oriented gram developed in the previous phase is
analysis focuses on the overall system put through a series of structured tests to
identify bugs, errors and problems.
C. Structured analysis focuses on pro-
cesses and data flow, while object- A. Planning
oriented analysis focuses on modeling B. Testing
real-world objects and their interactions.
C. Implementation
D. Structured analysis focuses on hard-
NARAYAN CHANGDER
ware, while object-oriented analysis fo- D. Maintenance
cuses on software 140. Industry-specific standards are specific
internally to the information technology
135. Batch processing is preferred over on-line
service industry.
transaction processing when i) processing
efficiency is important ii) the volume of A. True
data to be processed is large iii) only peri- B. False
odic processing is needed
141. Organizations that do not protect PII can
A. i, ii
face penalties, lawsuits, and loss of busi-
B. i, iii ness.
C. ii, iii A. true
D. i, ii, iii B. false
136. SDLC is sometimes referred to as the 142. Information system serving operational
waterfall methodology because it is com- level:
pleted one step at a time. A. ESS
A. true B. MIS
B. false C. DSS
D. TPS
137. Firewalls are to protect against
A. Virus Attacks 143. Information is critical when making deci-
sions.
B. Fire Attacks
A. TRUE
C. Data Driven Attacks
B. FALSE
D. Unauthorized Attacks
144. Which of the following are examples of
138. What is a Pivot Table in excel? an output device?
A. Its a table where you can perform mul-
tiple calculations regarding a defined data A.
B. Is a function to help excel performing
fast operations
C. All are correct B.
D. None are correct
154. The term is used to refer a row 159. helps to monitor performance, track
A. Record activities of competitors, identify opportu-
nities, and forecast trends. They also as-
B. Primary key sist senior managers
C. Foreign key
A. TPS
D. Field
B. ESS
155. Increasing variability is the key to under-
standing Six Sigma. C. Expert System
NARAYAN CHANGDER
A. True D. Data analytics
B. False
160. It is changing how firms design, produce,
156. Data errors can occur due to mistakes and deliver their products and services.
made during data entry, data manipula-
A. IT innovation
tion, or data transmission. Which follow-
ing scenario is its example? B. New Business Models
A. A customer typed in alphanumeric C. E-commerce expanding
characters in the mobile number field.
D. Management changes
B. There are first name and surname
fields in the accounts object, while there 161. Type of CRM used for planning
is only a full name field in the contacts ob-
ject. A. Strategic CRM
C. The administrator only included data B. Analytic CRM
from the Visayas and Luzon for national
C. Collaboration CRM
sales report generation.
D. An employee saved a confidential in his D. Operation CRM
personal drive and opted to sell it to the
company’s competitors. 162. Direction of information flow wherein the
flow is from and to customers, suppli-
E. A software created in 2015 never had ers, distributors, and other partners of the
updates that may include newer relevant business.
fields.
A. Upward
157. Most common reason for failure of large
projects is due to Organizational and polit- B. Downward
ical resistance to change C. Horizontal
A. False
D. Outward/Inward
B. True
163. Information in a classified enterprise
158. Modem/router
does not include information:
A. Input device
A. Strategy
B. Output device
C. Storage device B. Manage
D. CPU C. Operational
E. Telecommunications device D. Tactic
164. When people know when to apply tech- 170. Enterprise Resource Planning (ERPs) sup-
nology port:
A. Manufacturing processes.
176. CRM Manages firm’s relationships with decision making and control in an organi-
suppliers zation
A. True B. A set of interrelated information that
B. False collect (or retrieve), process, store, and
distribute components to support decision
177. Acceptance testing includes formal verifi- making and control in an organization
cation of requirements. C. A set of interrelated system that col-
A. True lect (or retrieve), product, and distribute
NARAYAN CHANGDER
B. False information to support decision making
and control in an organization
178. Data obsolescence can happen when in- D. A set of interrelated components that
formation becomes outdated or irrelevant, collect (or retrieve), process, store, and
leading to incorrect or outdated decisions. distribute information to support decision
Which following scenario is its example? making and control in an organization
A. A customer typed in alphanumeric
characters in the mobile number field. 181. Reasons why the marketing field re-
quires information systems, except
B. There are first name and surname
fields in the accounts object, while there A. High level of competition
is only a full name field in the contacts ob- B. Varied products
ject.
C. Information Technology Discovery
C. The administrator only included data
D. There is a marketing mix
from the Visayas and Luzon for national
sales report generation. 182. An information system can be defined as
D. An employee saved a confidential in his a set of interrelated components. The pur-
personal drive and opted to sell it to the pose is to collect, process, store and dis-
company’s competitors. tribute information to support businesses
E. A software created in 2015 never had in:
updates that may include newer relevant A. Communication between departments
fields. B. Create new products and services
179. help users to interactively sort, sub- C. Make decision
divide, combine, and organize data while
D. Analyze and process data
it is in its graphical form by transforming
figures and raw data into visual objects 183. Information system serving strategic
A. Statistical Model level:
B. Forecasting Model A. ESS
C. Predictive analysis B. MIS
D. Data Visualisation System C. DSS
A. A set of interrelated part of informa- 184. What is the purpose of system analysis
tion that collect (or retrieve), process, in the context of system analysis and de-
store, and distribute systems to support sign?
B. ERP B. False
196. In unit testing, a test case describes 201. Which of the following metrics best de-
the individual functionality/feature of the scribes the six sigma concept?
software that is being tested. Which of A. Reduces dependency on “Tribal Knowl-
the following is its example? edge”.
A. User cannot sign up to the system us- B. Provides a disciplined approach to
ing invalid email. problem-solving.
B. User can run the code. C. Attacks the high-hanging fruit (the
NARAYAN CHANGDER
C. 1. User inputs number “1”. 2. Press hard stuff).
[Enter] key. D. Creates a competitive advantage (or
D. <email address><password> disadvantage).
NARAYAN CHANGDER
TPS / MIS data
D. Management System
D. Support senior management
221. It refers to the connection of each system
216. In which phase of the system develop- or subsystem boundaries and serves as
ment process, specifications for a solution the connection to display the output from
that fulfills the business requirements is one system to the input of another system.
undertaken and the technical blueprint is
designed A. System Boundaries
B. Business understanding of customers, 241. What are the benefits of using databases
competitors, partners, and business in hospitals?
schools. A. Centralized storage of patient data
C. Brainpower and social progress are B. Enforcement of data integrity
applied in business.
C. Efficient data retrieval
D. All of the above.
D. All of the above
236. Information systems that monitor the ele-
NARAYAN CHANGDER
mentary activities and transactions of the 242. is the general transformation cycle
organizations are for information?
A. Create A. True
B. Grant B. False
B. During implementation, all steps are 261. An information system that supports the
described in knowledge documents. planning and assessment needs of execu-
tive management is
C. The issues and concerns were investi-
gated to find the root cause. A. GDSS
D. After knowing the root cause of the is- B. TPS
sues, solutions are generated and perma- C. ERP
nent fixes are applied.
D. None of them
NARAYAN CHANGDER
E. Upon movement of the fixes to produc-
tion, proper authentications are given to 262. Sales Projections and responses to
the users depending on their roles and queries are information output character-
profiles. istics associated with a(n):
A. DSS
257. It is not necessary for technology employ-
ees to possess business skills. B. MIS
C. OAS
A. true
D. TPS
B. false
263. Which software is not a database man-
258. A warranty of 10 years is given to the agement system:
customers of an appliance manufacturer.
A. Java
A. Conformance
B. MySQL
B. Reliability C. SQL Server
C. Durability D. Postgresql
D. Perceived Quality
264. Creative Commons is a non-profit organi-
E. Serviceability zation that provides legal tools for artists
and authors.
259. Direction of information flow wherein
A. true
daily transactions are from the lower level
to a higher level until it reaches the top. B. false
A. Upward 265. Software systems created and updated
B. Downward by a community of users and royalty-free
are software that:
C. Horizontal
A. Open source code
D. Outward/Inward
B. Closed source code
260. A system that works for Senior Manage- C. Microsoft
ment D. MacOS
A. Transaction Processing Systems
266. Operational excellence seeks to improve
B. Management Information systems the operations of the business.
C. Decision Support Systems A. TRUE
D. Executive Support Systems B. FALSE
267. The purpose of using a Decision Tree is: B. *Identifying the management that is
A. To describe the processing content to needed for efficient decision making in or-
ganizations
269. Intellectual property is property that de- 274. Market power of suppliers when firm can
rives from the work of the mind or intel- raise as fast as suppliers
lect. A. False
A. true B. True
B. false 275. W3C stands for ?
270. What are the uses of databases in orga- A. World Wide Web Consortium
nizations? B. World Wide Web Collaboration
A. Storing details about criminals C. World Wide Web Community
B. Storing details about pupils D. None of the mentioned
C. Storing details about patients
276. Data incompleteness occurs when impor-
D. All of the above tant information is missing from a dataset,
leading to incomplete or inaccurate anal-
271. Correct statements related to ERP (Enter-
ysis and decisions. Which following sce-
prise Resources Planning), except
nario is its example?
A. Employee Relationship Management
A. A customer typed in alphanumeric
B. Customer Relationship Management characters in the mobile number field.
C. Supply Chain Management B. There are first name and surname
D. Activity Based Management fields in the accounts object, while there
is only a full name field in the contacts ob-
272. Define Management Information System ject.
(MIS) C. The administrator only included data
A. *Identifying the system that is needed from the Visayas and Luzon for national
for effective conclusion in organizations sales report generation.
NARAYAN CHANGDER
C. Rationalization
A. Central Protocol Unit
D. Paradigm shift
B. Control Processing Unit
C. Control Protocol Unit 283. Interviews and surveys are information
quality audit methods that aim to gather
D. Central Processing Unit
feedback and information about the qual-
278. Question 3:What makes Apple’s mobile ity of data and systems.
phone products always different in the A. True
market compared to other phone brands? B. False
A. Good quality and affordable price
284. A prototype version of the software was
B. There are many new features being up- tested by selected users prior to the imple-
dated all the time mentation.
C. There is a separate operating system A. Integration Testing
IOS
B. System Testing
D. The product has high configuration and
C. Stress Testing
large capacity
D. Beta Testing
279. IaaS is a component that talks about:
E. Acceptance Testing
A. Foundation in cloud computing
285. 9) Sheila works as a account assistant
B. Online database
in the Chicken Rice Shop company, she
C. Open source software or web server has told by her boss to record the amount
service of selling in the computer, which program
D. Infrastructure in cloud computing meet Sheila’s task?
A. MS Office Power Point
280. What sources of information do compa-
nies use to collect NORA data B. VBA Database System
C. MS Office Access
A. Social media posts
D. MS Office Excel
B. Clickstream
C. Arrest records 286. Enterprise systems
D. All of the above A. Collects data from different firm func-
tions and stores data in single central
281. What are the types of Hackers? data repository
A. Black Hat Hacker B. Resolves problem of fragmented data
B. White Hat Hacker C. Coordination of daily activities
D. PHP language and SQL Server 292. Which of the following applications does
database not specialize in customer care and man-
agement:
288. It is a software that allows an organiza-
A. Bitrix24
tion to collect and manage data efficiently
in which it acts as an interface between B. Getfly
data resources and application programs. C. SalesForce
A. Database System D. SharePoint
B. Management Information System
293. Marketing research subsystem
C. Integration system
A. Collects all kinds of information, but
D. Database Management System most of the activities are aimed at the de-
velopment of the company’s environment
289. Collaboration technologies can be classi-
fied in terms of whether they support in- B. Collecting all kinds of information, but
teractions at the same or different time or most of the activities are aimed at com-
place or whether these interactions are re- petitors, governments
mote or co-located. C. Collects all kinds of information, but
most activities are aimed at customers
and potential customers.
D. none of above
NARAYAN CHANGDER
C. decision making
302. Which type of database model stores and
D. all true manages semi-structured or unstructured
data?
297. Public-key cryptography is also known
as? A. Hierarchical database model
A. asymmetric cryptography B. Network database model
B. symmetric cryptography C. Object-oriented database model
307. Standard is the ability of a product or 311. Managing cash accounts belongs to what
service to consistently meet or exceed cus- functional areas?
tomer expectations. A. Manufacturing and Production
A. True B. Sales and Marketing
B. False C. Finance and Accounting
308. Which of the following describes an ERP D. Human Resources
system?
312. The network is limited to a certain dis-
A. ERP systems provide a foundation for tance, usually within 1 or a few buildings
collaboration between departments very close together
B. ERP systems enable people in differ- A. WAN
ent business areas to communicate
B. MAN
C. ERP systems have been widely
adopted in large organisations to store C. Internet
critical knowledge used to make the deci- D. LAN
sions that drive the organisation’s perfor-
mance 313. a system that provides reports on the
D. All of the above company’s latest performance based on
data from Transaction processing systems
309. Which device is the output device: and functions for middle management
A. RAM A. Transaction processing systems
B. Keyboard B. Management Information Systems
C. CPU C. Decision Support Systems
D. Monitor D. Executive Support Systems
310. 8) Management information system can 314. The document listing all procedure and
be characterized in 4 ways, which is true regulations that generally govern an orga-
except? nization is the
A. Transaction processing systems docu- A. Administrative policy manuall
ment the exchange of goods and services.
B. Personal policy book
B. Accounting information systems are
C. Procedures log
designed to collect, organize and summa-
rize data that is use in management D. Organization manual
315. A field of science and technology based on 320. Business entities exist to make profits.
disciplines such as computer science, biol- A. TRUE
ogy, psychology, linguistics, mathematics,
and engineering is known as B. FALSE
A. Artificial Intelligence 321. Which of the following metrics best fits
B. NanoTechnology the six sigma methodology?
C. Robotics A. Is a more sensitive indicator than a
percentage or average-based metric.
NARAYAN CHANGDER
D. Virtual Reality
B. Establishes a common metric to make
316. Which type of database model allows for
comparisons easier.
the storage of objects in a database?
C. Even one defect reflects a failure in
A. Hierarchical database model
your customer’s eyes.
B. Network database model
D. It focuses on defects.
C. Object-oriented database model
D. Relational database model 322. Organizations and environments have a
triple relationship
317. is process for collecting and managing
A. False
data from varied sources to provide mean-
ingful business insights. And the process B. True
for collecting and managing data from var-
ied sources to provide meaningful business 323. Trademarks last as long as they are being
insights. used and defended by the company.
A. Operational database A. true
B. Data mining B. false
C. Data warehouse 324. Database servers store and retrieve
D. Databases large volumes of structured data on high
speed disk arrays.
318. Network coverage within a city:
A. TRUE
A. WAN
B. LAN B. FALSE
NARAYAN CHANGDER
ment for the upcoming implementation.
D. The process of increasing redundancy
B. During implementation, all steps are and dependency in a database to improve
described in knowledge documents. data integrity.
C. The issues and concerns were investi- 343. In unit testing, an expected result de-
gated to find the root cause. scribes the part of the code that describes
D. After knowing the root cause of the is- that the previous test case was successful.
sues, solutions are generated and perma- Which of the following is its example?
nent fixes are applied. A. User cannot sign up to the system us-
E. Upon movement of the fixes to produc- ing invalid email.
tion, proper authentications are given to B. User can run the code.
the users depending on their roles and
C. 1. User inputs number “1”. 2. Press
profiles.
[Enter] key.
340. In a management information system, a D. <email address><password>
company can find out how much revenue E. Prompt “Hello Passenger, please sign
it earns from the loyalty of certain cus- in using your email”.
tomers
A. Customer Relationship Management 344. NORA is the collection of data that is
used by private organizations to target
B. Partner Relationship Management consumers.
C. Employee Relationship Management A. true
D. Knowledge Management B. false
341. Which of the following six sigma method- 345. The flow of the Agile methodology is
ologies is the more important to improve and the design process is
the current capabilities of an existing pro- A. Structured, Methodical
cess?
B. Structured, Interactive
A. IDOV
C. Incremental, Iterative
B. DMADV D. Minimalist, Iterative
C. DMAIC
346. A trademark will be awarded even if it
D. None of the above. causes confusion with an existing trade-
mark
342. Explain the concept of normalization in
the context of database management sys- A. true
tems. B. false
347. The working version of the software was 353. Stress testing exercises the entire appli-
tested by the actual end users prior to the cation to make it fail.
implementation.
359. A set of acceptable behaviors for a pro- 364. Acquiring, training and retaining good
fessional or social group is known as: network which should be at top priority?
A. Morals A. Data entry
B. Values B. Lab incharge
C. Ethics C. Administrator
D. Laws D. System tester
NARAYAN CHANGDER
360. Question 6:Which three giants have been 365. Which of the following individuals typ-
competing to dominate customer experi- ically have less formal, advanced educa-
ence on the Internet? tional degrees and tend to process rather
than create information?
A. Microsoft, Chrome, Google
A. Knowledge workers
B. Google, Apple, Chrome
B. Executives
C. Apple, Google, Microsoft
C. System Analysts
D. Apple, Google, Chrome, Microsoft
D. Data workers
361. The following are the functions of a
DBMS except 366. Executive Support Systems help top-level
management to plan strategies.
A. Creating database
A. True
B. Processing data
B. False
C. Creating and processing forms
367. A Transaction Processing System differs
D. Administrating database
from a batch processing system in that it
362. It is a type of Information System that processes information in real time
uses artificial intelligence to be able to pre- A. true
serve the knowledge of an expert and to
B. false
solve problems.
A. Transaction Processing System 368. All of the following are steps in the busi-
ness planning process EXCEPT:
B. Supply Chain Management System
A. Gathering Information
C. Business Support System
B. Storing Information
D. Expert Support System
C. Using Information
363. It is a component of the system that D. Deleting Information
refers to the data or information that has
been processed and displayed to the end 369. Which of the four software development
users. methodologies is the most risky?
A. Input A. SDLC
B. Output B. RAD
C. Process C. Agile
D. Control D. Lean
370. What is the purpose of constraints in a 375. US policies favor consumers and are opt-
database? in; EU policies favor businesses and are
opt-out.
374. Decisions in which the decision maker 379. The company’s strategy is to maximize
must provide judgment, evaluation, and in- profits and cash flow without paying at-
sights into the problem definition would be tention to market growth
characterized as A. low cost
A. Structured B. product differentiation
B. Semi structured C. market niche
C. Unstructured D. strengthen customer and supplier fa-
D. None of them miliarity
NARAYAN CHANGDER
including sales, marketing and service D. Understandability
D. Manage the process for gathering and 386. The system resolves IP addresses into
applying knowledge and expertise corresponding domain names:
381. is an interactive and reliable A. DNS
computer-based decision-making system B. HTML
which uses both facts and heuristics to C. UML
solve complex decision-making problem
D. FTP
A. ESS
387. Who have concerned with tactical (short-
B. MIS
term) operational problems and decision
C. Expert system making?
D. None of above A. supervisors
B. middle managers
382. IT infrastructure Set of physical devices
only required to operate enterprise C. executive managers
NARAYAN CHANGDER
els of management and by individuals and
teams of business professionals. This dra- A. TRUE
matic expansion has opened the door to B. FALSE
the use of which of the following tool?
A. Business Intelligence 407. The 3 type of enterprise system is enter-
prise resources process (ERP), enterprise
B. Business Knowledge
analysing systems and customer relation-
C. Business Ideas ship management software.
D. Business Intelligence A. TRUE
402. Software consists of and types. B. FALSE
A. System software and Microsoft win- 408. When people can define what informa-
dows tion is needed, knows how and where to
B. Application software and system soft- obtain information, understands the infor-
ware mation, can act appropriately based on
this information.
C. Word processing and system software
A. Technology literacy
D. none of above B. Information literacy
C. Ethics
403. Decision Support Systems are used by
lower-level managers D. none of above
A. TRUE
409. Which level of leadership in the organiza-
B. FALSE tion is responsible for short-term planning
and controlling the company’s daily activi-
404. Connecting disparate storage devices ties?
over a high-speed network for storage is
a function A. Executive level
A. database B. Operational level
B. Storage area networks (SANs) C. Strategic level
C. hard disk D. Supervisory level
D. all wrong 410. Environments generally change as fast as
the Organizations
405. is used to help managers make right
decision in important areas of business. A. False
A. Decision Support System B. True
411. It is a characteristic of information in 417. *What does it take to succeed in MIS ca-
which information must be correct or pre- reers? (can pick more than 1 answer)
cise. A. Business skills
NARAYAN CHANGDER
423. The Lean methodology focuses on taking B. false
an initial idea and creating a “Minimum Vi-
able Product”. 429. Assembling a product, identifying cus-
tomers and hiring employees are
A. true
A. Transactions
B. false
B. Business model
424. A patent holder has the right to exclude
others from all of the following EXCEPT C. Business processes
for: D. Business Functions
A. Purchasing the invention
430. Type of CRM used to analyze data
B. Selling the invention
A. Analytic CRM
C. Manufacturing the invention
B. Strategic CRM
D. Importing the invention
C. Collaboration CRM
425. This type of attack is designed to hin-
der the normal operation of a website, or D. Operation CRM
other network resource.
431. Question 4:In 2009, since the emergence
A. DoS attack of the Internet, Apple’s revenue has in-
B. POS attack creased significantly and exceeded how
C. Phishing many billion USD?
D. none of above A. 60 billion USD
426. All of the following are potential MIS ca- B. 40 billion USD
reers except for: C. 50 billion USD
A. Systems Analyst D. 70 billion USD
B. Graphics Artist
432. The advantage of Enterprise Information
C. Operator
Systems (EIS) can be realized when organi-
D. Web Developer zations are able to utilize their capabilities
in order to exploit the technological possi-
427. In defining information quality, this is
bilities of the EIS in addition to their will-
how fast can you get access to the infor-
ingness to change their business routines.
mation as well as if the information is rel-
evant to current period. A. TRUE
A. Timeliness B. FALSE
433. Successful collaboration requires an ap- 437. Poor quality input results poor quality
propriate organizational structure and cul- output
ture, along with appropriate collaboration
443. What is WRONG definition of a Data? 448. Which of the following processes does
A. Data represent, conditions, ideas, or not belong to the company/enterprise:
objects. A. Resolve complaints
B. Data is created thru physical molding.
B. Sell
C. Data Driven by user demand.
C. Customer purchasing decisions
D. Data is limitless and present every-
where in the universe. D. Purchasing decisions of compa-
NARAYAN CHANGDER
nies/enterprises
444. Hardware is made up of the computers,
printers, networking devices, etc. 449. Which of the following statements is
A. TRUE MOST CORRECT?
B. FALSE A. The user may not be the buyer of goods
and services but the user of those goods
445. The two types of planning are:
and services.
A. Long-term, short-term
B. Customers are buyers of goods and
B. Broad, Specific
services
C. Operational, Specific
C. A user is a buyer of goods and services
D. Individualistic, Company-wide
D. All right
446. Information should be available when it
is needed. 450. The information must come from a not re-
A. TRUE liable source.
B. FALSE A. TRUE
447. Widening Scope of IS B. FALSE
B. Common methods for authentication 459. Which of the following is a common ex-
include retinal scans ample of a “phishing” attack?
C. Common methods for authentication A. You receive an email from an acquain-
include handwritten signatures tance with who you are rarely in contact
D. Common methods for authentication that contains only a web link.
include voice recognition B. You got an email that appears to be
from your bank asking you to enter your
455. Data is an individual unit that contains
account number and password, but the
raw material which does not carry any spe-
web address looks unfamiliar.
cific meaning.
C. You received a text message claiming
A. False
that you won a contest and asking you to
B. True click on the link.
456. Question 9:In fact, some analysts specu- D. All of the above
late that Google envisions
460. With Microsoft’s Azure cloud computing
A. A future where cell phones cost a frac- platform, we can:
tion of what they cost today
A. Rent a virtual server (VM) & install ap-
B. A future where mobile phones are free, plications
powered only by advertising revenue
B. Hosting
C. A future where mobile phones cost a
fraction of what they do today, or even C. Save web applications without renting
free, with just advertising revenue a server
D. A future where cell phones cost more D. All right
than they do today
461. SQL is
457. What type of computing technology A. System Query Language
refers to services and applications that
typically run on a distributed network B. Structured Query Language
through virtualized resources? C. Structured Query Location
A. Distributed Computing D. System Query Location
NARAYAN CHANGDER
D. Enterprise collaboration system records) used to solve tasks is included in
the computer system
463. example of a relational DBMS
B. Information (data, documents,
A. MySQL
records) used to solve work.
B. SQL server
C. The information to be searched for
C. oracle database (data, documents, records) is used to
D. all true solve the job
D. Stored information (data, documents,
464. What are the five elements of the man-
records) used to solve work.
agement information system?
A. People, Software, Hardware, Data, 469. In unit testing, a pre-condition describes
Processes the prior part of the code needed for a test
B. Computers, People, Software, Data, case to be executed. Which of the follow-
Processes ing is its example?
472. Which type of database allows for the 474. Which of the following statements is
central storage of patient data? MOST CORRECT?
A. Relational database A. A customer is a buyer of goods and ser-
B. Hierarchical database vices but may not be a user
C. Network database B. Customers are buyers of goods and
D. Object-oriented database services
C. A user is a buyer of goods and services
473. It is the tangible components of a com-
puter system that you can use to input and D. All right