MCQs > Softwares & Applications > Management Information Systems (MIS) MCQs > Basic Management Information Systems (MIS) MCQs

Basic Management Information Systems (MIS) MCQ

1. The ability to _____ is a characteristic of an mis system.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

2. To get the number of items stored in a listbox, use the ________ property.

Answer

Correct Answer: Items.Count

Note: This Question is unanswered, help us to find answer for this one

3. The web page displayed when a user first visits a site is called a(n) _____.

Answer

Correct Answer: Splash screen

Note: This Question is unanswered, help us to find answer for this one

4. The term hard drive refers collectively to hard disks and ______.

Answer

Correct Answer: SSDs

Note: This Question is unanswered, help us to find answer for this one

5. The principal manager of the is department is typically referred to as the ______.

Answer

Correct Answer: CIO

Note: This Question is unanswered, help us to find answer for this one

6. The ________ manager makes tactical decisions to implement the strategic goals of an organization.

Answer

Correct Answer: Tactical

Note: This Question is unanswered, help us to find answer for this one

7. Search tools typically use a(n) ______, which stores a variety of information about a file.

Answer

Correct Answer: Index

Note: This Question is unanswered, help us to find answer for this one

8. Scheduling and assigning employees might be handled by a _____.

Answer

Correct Answer: Personnel information system

Note: This Question is unanswered, help us to find answer for this one

9. most current displays are a type of ______ display.

Answer

Correct Answer: Flat-panel

Note: This Question is unanswered, help us to find answer for this one

10. Instead of using the if-then-else rules that expert systems use, _____ use patterns.

Answer

Correct Answer: Artificial neural networks

Note: This Question is unanswered, help us to find answer for this one

11. ____ software helps you carry out tasks using a computer, such as editing a photo.

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

12. ______ is a form of database processing that supports top-down, query-driven data analysis.

Answer

Correct Answer: Online analytical processing (OLAP)

Note: This Question is unanswered, help us to find answer for this one

13. In the five-component model, the process of automation is a process of moving work from ________.

Answer

Correct Answer: The human side to the computer side

Note: This Question is unanswered, help us to find answer for this one

14. In the design of an organization, another name for ""market structure"" is ""________ structure.""

Answer

Correct Answer: Customer

Note: This Question is unanswered, help us to find answer for this one

15. In the criterion, <=250, the operator will return values for the specified field that are ____.

Answer

Correct Answer: Less than or equal to 250

Note: This Question is unanswered, help us to find answer for this one

16. Click-through rate reflects ________.

Answer

Correct Answer: The ratio of surfers who click on an ad divided by the number of times it was displayed

Note: This Question is unanswered, help us to find answer for this one

17. The ____ e-commerce model is an example of the government selling confiscated cars at auction.

Answer

Correct Answer: G2B

Note: This Question is unanswered, help us to find answer for this one

18. According to the disruptive growth engine, executive leadership will allow a firm to ________.

Answer

Correct Answer: Gain credibility and to bridge sustaining and disruptive product development

Note: This Question is unanswered, help us to find answer for this one

19. According to brooks' law, adding more people to a late project ________.

Answer

Correct Answer: Makes the project later

Note: This Question is unanswered, help us to find answer for this one

20. A(n) ________ is a formal description of a system's response to use and misuse scenarios.

Answer

Correct Answer: Test plan

Note: This Question is unanswered, help us to find answer for this one

21. A(n) ________ capability allows users to view more detailed views of data.

Answer

Correct Answer: Drill-down

Note: This Question is unanswered, help us to find answer for this one

22. A social bookmarking site is dedicated to providing all of the following except ________.

Answer

Correct Answer: To reconnect with colleagues for business progress

Note: This Question is unanswered, help us to find answer for this one

23. A schematic diagram that uses symbols to represent the parts of a system is a(n) ____.

Answer

Correct Answer: Flow chart

Note: This Question is unanswered, help us to find answer for this one

24. A ________ is a group of related data that can be stored, sorted, organized, and queried.

Answer

Correct Answer: Database

Note: This Question is unanswered, help us to find answer for this one

25. A ________ involves balancing three critical factors: requirements, cost, and time.

Answer

Correct Answer: Trade-off

Note: This Question is unanswered, help us to find answer for this one

26. A ________ has a microchip that is loaded with identifying data.

Answer

Correct Answer: Smart card

Note: This Question is unanswered, help us to find answer for this one

27. ________ solicits online input such as product ratings from consumers.

Answer

Correct Answer: Crowdsourcing

Note: This Question is unanswered, help us to find answer for this one

28. ________ is an example of an inter-enterprise information system.

Answer

Correct Answer: ARES

Note: This Question is unanswered, help us to find answer for this one

29. ________ behavior is not conforming to a set of approved standards of behavior.

Answer

Correct Answer: Unethical

Note: This Question is unanswered, help us to find answer for this one

30. ________ are reports produced when something out of predefined bounds occurs.

Answer

Correct Answer: Exception reports

Note: This Question is unanswered, help us to find answer for this one

31. ________ are predesigned procedures for using software products.

Answer

Correct Answer: Inherent processes.

Note: This Question is unanswered, help us to find answer for this one

32. ________ a site means to take extraordinary measures to reduce a system's vulnerability.

Answer

Correct Answer: Hardening

Note: This Question is unanswered, help us to find answer for this one

33. ________ is used to solve large-scale computing problems.

Answer

Correct Answer: Grid computing

Note: This Question is unanswered, help us to find answer for this one

34. ________ is the process of sorting, grouping, summing, filtering, and formatting structured data.

Answer

Correct Answer: Reporting analysis

Note: This Question is unanswered, help us to find answer for this one

35. ________ is redistributing goods or products we own by sharing them.

Answer

Correct Answer: Collaborative consumption

Note: This Question is unanswered, help us to find answer for this one

36. ________ is a management methodology that translates a firm's goals into operational targets.

Answer

Correct Answer: BPM

Note: This Question is unanswered, help us to find answer for this one

37. You can sort files ____.

Answer

Correct Answer: No matter which view you use

Note: This Question is unanswered, help us to find answer for this one

38. A _____ is automatically launched by some trigger and appears behind the active window.

Answer

Correct Answer: Pop-under ad

Note: This Question is unanswered, help us to find answer for this one

39. In the ________ phase a prototype of the website will often be created.

Answer

Correct Answer: Design

Note: This Question is unanswered, help us to find answer for this one

40. Costs that do not vary according to production volume are called _____.

Answer

Correct Answer: Fixed costs

Note: This Question is unanswered, help us to find answer for this one

41. A social media policy used by an organization is a statement that ________.

Answer

Correct Answer: That delineates employees' rights and responsibilities

Note: This Question is unanswered, help us to find answer for this one

42. Lead generation is a common departmental information system activity in the ________ department.

Answer

Correct Answer: Sales and marketing

Note: This Question is unanswered, help us to find answer for this one

43. In the 1990s, business process management was known as ________.

Answer

Correct Answer: Business process reengineering

Note: This Question is unanswered, help us to find answer for this one

44. In the _____, the production process begins with a forecast.

Answer

Correct Answer: Push model

Note: This Question is unanswered, help us to find answer for this one

45. An internally focused system helps an organization coordinate with its ________.

Answer

Correct Answer: Its departments

Note: This Question is unanswered, help us to find answer for this one

46. ________ includes general management, finance, accounting, legal, and government affairs.

Answer

Correct Answer: Firm Infrastructure

Note: This Question is unanswered, help us to find answer for this one

47. ____ enables business partners to send and receive information on business transactions.

Answer

Correct Answer: Electronic data interchange

Note: This Question is unanswered, help us to find answer for this one

48. Record keeping, payroll, and simple inventory problems are examples of ____ tasks.

Answer

Correct Answer: Structured

Note: This Question is unanswered, help us to find answer for this one

49. Identifying the stage of a group's development is important to managers because ___________.

Answer

Correct Answer: When problems arise within the​ group, the manager will know how to help the group work through them

Note: This Question is unanswered, help us to find answer for this one

50. In most large organizations, the is department is divided into the following functions __________.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

51. The executive level of an organization is also known as the ________ level.

Answer

Correct Answer: Strategic

Note: This Question is unanswered, help us to find answer for this one

52. The key use of the order promising module of supply chain management is to ________.

Answer

Correct Answer: Provide answers to customer relationship management queries regarding product availability, costs, and delivery times

Note: This Question is unanswered, help us to find answer for this one

53. Peering usually takes place at neutral sites called _____.

Answer

Correct Answer: IXPs

Note: This Question is unanswered, help us to find answer for this one

54. A _____ can be as powerful as a desktop computer.

Answer

Correct Answer: Laptop

Note: This Question is unanswered, help us to find answer for this one

55. An internal user is one who is a ____.

Answer

Correct Answer: Worker in an organization

Note: This Question is unanswered, help us to find answer for this one

56. A web ______ is a computer that delivers requested webpages to your computer or mobile device.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

57. As water warms, it ________.

Answer

Correct Answer: Decreases in density

Note: This Question is unanswered, help us to find answer for this one

58. An executive information system (eis) is a branch of ____.

Answer

Correct Answer: DSS

Note: This Question is unanswered, help us to find answer for this one

59. You use ________ to predict when a computer hardware system becomes saturated.

Answer

Correct Answer: Capacity planning

Note: This Question is unanswered, help us to find answer for this one

60. __________ are achieved by using middleware

Answer

Correct Answer: Integrations

Note: This Question is unanswered, help us to find answer for this one

61. Semistructured decisions are often used in _____.

Answer

Correct Answer: Sales forecasting

Note: This Question is unanswered, help us to find answer for this one

62. In online analytical processing systems, ________ provide a way to summarize the data.

Answer

Correct Answer: Dimensions

Note: This Question is unanswered, help us to find answer for this one

63. The basal nuclei (basal ganglia) ________.

Answer

Correct Answer: Collection of gray matter w/in each cerebral hemisphere

Note: This Question is unanswered, help us to find answer for this one

64. By default, access and other dbmss create indexes automatically for the ____ keys.

Answer

Correct Answer: Primary and foreign

Note: This Question is unanswered, help us to find answer for this one

65. Symmetric dsl usually has an upstream rate of ____ mbps.

Answer

Correct Answer: 1.5

Note: This Question is unanswered, help us to find answer for this one

66. The connection between two tables in a database is called a _________.

Answer

Correct Answer: Relationship

Note: This Question is unanswered, help us to find answer for this one

67. One of the challenges with unsupervised data mining is ________.

Answer

Correct Answer: The analyst must develop explanations for patterns after observing the pattern

Note: This Question is unanswered, help us to find answer for this one

68. An organization that uses cloud services ________.

Answer

Correct Answer: Can limit the response time of its Web pages

Note: This Question is unanswered, help us to find answer for this one

69. The data ____ component is used to add, delete, modify, and retrieve records from a database.

Answer

Correct Answer: Data manipulation

Note: This Question is unanswered, help us to find answer for this one

70. Data mining is more ________ than olap.

Answer

Correct Answer: Discovery driven

Note: This Question is unanswered, help us to find answer for this one

71. Control in a global information system (gis) requires _____.

Answer

Correct Answer: Defined behaviors for different processes

Note: This Question is unanswered, help us to find answer for this one

72. Significant changes in is should trigger a reassessment of the _____________.

Answer

Correct Answer: Business strategy

Note: This Question is unanswered, help us to find answer for this one

73. Identifying customers is a responsibility of the ________ function.

Answer

Correct Answer: Sales and marketing

Note: This Question is unanswered, help us to find answer for this one

74. In 2025, emergence in the context of management would most likely mean a(n) ________.

Answer

Correct Answer: Loss of control over employees

Note: This Question is unanswered, help us to find answer for this one

75. Identifying competitive advantages can be difficult and explains why they are typically __________.

Answer

Correct Answer: Temporary

Note: This Question is unanswered, help us to find answer for this one

76. E-commerce fulfills the product information activity using _____.

Answer

Correct Answer: Web sites

Note: This Question is unanswered, help us to find answer for this one

77. Discussion forums are better suited than emails in asynchronous communication because ________.

Answer

Correct Answer: They keep the discussion from getting off track.

Note: This Question is unanswered, help us to find answer for this one

78. Business intelligence systems generate business intelligence by __________ data.

Answer

Correct Answer: Identifying patterns in

Note: This Question is unanswered, help us to find answer for this one

79. Browser-based database applications differ from traditional applications in that they ________.

Answer

Correct Answer: Are usually open to the public

Note: This Question is unanswered, help us to find answer for this one

80. A(n) ________, in which the highest bidder wins, is the most common form of auction.

Answer

Correct Answer: English auction

Note: This Question is unanswered, help us to find answer for this one

81. A field or a group of fields that make a record unique in a table is called a(n) ________.

Answer

Correct Answer: Primary key

Note: This Question is unanswered, help us to find answer for this one

82. A business process is a network of ________ that receive inputs and produce outputs.

Answer

Correct Answer: Activities

Note: This Question is unanswered, help us to find answer for this one

83. A business process in the ________ function is producing bills of material.

Answer

Correct Answer: Manufacturing and production

Note: This Question is unanswered, help us to find answer for this one

84. A build-to-order supply-chain model is also called a ________ model.

Answer

Correct Answer: Demand-driven

Note: This Question is unanswered, help us to find answer for this one

85. A ________ pretends to be a legitimate company and sends emails requesting confidential data.

Answer

Correct Answer: Phisher

Note: This Question is unanswered, help us to find answer for this one

86. A ________ is a worldwide-unique term that is affiliated with a public ip address.

Answer

Correct Answer: Domain name

Note: This Question is unanswered, help us to find answer for this one

87. ________ systems are designed to handle multiple concurrent transactions from customers.

Answer

Correct Answer: OLTP

Note: This Question is unanswered, help us to find answer for this one

88. ________ refers to the source, format, assumptions and constraints, and other facts about the data.

Answer

Correct Answer: Metadata

Note: This Question is unanswered, help us to find answer for this one

89. ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.

Answer

Correct Answer: Acquisition

Note: This Question is unanswered, help us to find answer for this one

90. ________ is defined as recorded facts or figures.

Answer

Correct Answer: Data

Note: This Question is unanswered, help us to find answer for this one

91. ________ is a popular commercial webinar product used in virtual sales presentations.

Answer

Correct Answer: WebEx

Note: This Question is unanswered, help us to find answer for this one

92. ________ delivers business intelligence to users without any request from the users.

Answer

Correct Answer: Push publishing

Note: This Question is unanswered, help us to find answer for this one

93. ________ decisions are the most structured and have very little need for collaboration.

Answer

Correct Answer: Operational

Note: This Question is unanswered, help us to find answer for this one

94. ________ can be induced by tens of thousands of repetitions under low-impact loads.

Answer

Correct Answer: RSI

Note: This Question is unanswered, help us to find answer for this one

95. ________ are viruses that masquerade as useful programs or files.

Answer

Correct Answer: Trojan horses

Note: This Question is unanswered, help us to find answer for this one

96. When the granularity of data is too fine, ________.

Answer

Correct Answer: It can be made coarser by summing and combining

Note: This Question is unanswered, help us to find answer for this one

97. Using a vpc, an organization can store its ________.

Answer

Correct Answer: Most sensitive data.

Note: This Question is unanswered, help us to find answer for this one

98. Traditional database application programs are ________.

Answer

Correct Answer: Think applications that need to be installed on users' computers

Note: This Question is unanswered, help us to find answer for this one

99. The two types of visionary leadership are _____.

Answer

Correct Answer: Charismatic leadership and transformational leadership

Note: This Question is unanswered, help us to find answer for this one

100. The traditional network design approach does not work well for _________ networks.

Answer

Correct Answer: Rapidly growing

Note: This Question is unanswered, help us to find answer for this one

101. The results generated in the map phase are combined in the ________ phase.

Answer

Correct Answer: Reduce.

Note: This Question is unanswered, help us to find answer for this one

102. The output of an information system is _____.

Answer

Correct Answer: Information

Note: This Question is unanswered, help us to find answer for this one

103. The outermost components of the is framework ________.

Answer

Correct Answer: Can take action

Note: This Question is unanswered, help us to find answer for this one

104. As a result of moore's law, ________.

Answer

Correct Answer: The price to performance ratio of computers has fallen dramatically

Note: This Question is unanswered, help us to find answer for this one

105. A typical example of a geographic information system is a(n) _____.

Answer

Correct Answer: Map

Note: This Question is unanswered, help us to find answer for this one

106. In dbms, data are kept separate from the application's programming code. this means that ________.

Answer

Correct Answer: The database does not need to be changed if a change is made to an application

Note: This Question is unanswered, help us to find answer for this one

107. In comparison with unstructured information, semi-structured information ________.

Answer

Correct Answer: Is easier to query and aggregate

Note: This Question is unanswered, help us to find answer for this one

108. In cloud computing, resources are said to be ""pooled"" because organizations ________.

Answer

Correct Answer: Share the same physical hardware through virtualization

Note: This Question is unanswered, help us to find answer for this one

109. Bookseller barnes & noble is an example of a ________ company.

Answer

Correct Answer: Click -and -motar

Note: This Question is unanswered, help us to find answer for this one

110. An organization is ________.

Answer

Correct Answer: A deliberate arrangement of people to accomplish some specific purpose

Note: This Question is unanswered, help us to find answer for this one

111. An enterprise resource planning (erp) solution does not include ________.

Answer

Correct Answer: The company's operational data

Note: This Question is unanswered, help us to find answer for this one

112. An end-user license agreement, or _____, grants one user the right to use the software.

Answer

Correct Answer: EULA

Note: This Question is unanswered, help us to find answer for this one

113. All of the following sequences are stages of the machine cycle except _________.

Answer

Correct Answer: The real step are Fetch, execute and store and decode

Note: This Question is unanswered, help us to find answer for this one

114. A(n) _____ provides software and a network that connects businesses within an industry.

Answer

Correct Answer: Electronic exchange

Note: This Question is unanswered, help us to find answer for this one

115. All of the following are challenges in implementing an enterprise system except ________.

Answer

Correct Answer: Old technology

Note: This Question is unanswered, help us to find answer for this one

116. The purpose of predeparture language and cross-cultural training is to _____.

Answer

Correct Answer: Reduce the uncertainty felt by expatriates

Note: This Question is unanswered, help us to find answer for this one

117. An e-commerce web site that processes orders requires, at minimum, a ________ system architecture.

Answer

Correct Answer: Two-tier

Note: This Question is unanswered, help us to find answer for this one

118. When customers access a web site and make purchases, they generate _____.

Answer

Correct Answer: Clickstream data

Note: This Question is unanswered, help us to find answer for this one

119. Users of smart cards are required to enter a ________ to be authenticated.

Answer

Correct Answer: Personal identification number

Note: This Question is unanswered, help us to find answer for this one

120. Transaction processing (tp) systems ____.

Answer

Correct Answer: Process data generated by day-to-day business operations

Note: This Question is unanswered, help us to find answer for this one

121. Problematic data are referred to as ________.

Answer

Correct Answer: Dirty data

Note: This Question is unanswered, help us to find answer for this one

122. Organizations should protect sensitive data by storing it in ________ form.

Answer

Correct Answer: Encrypted

Note: This Question is unanswered, help us to find answer for this one

123. In a typical company organizational model, middle managers ____.

Answer

Correct Answer: Provide direction, necessary resources, and performance feedback to supervisors and team leaders

Note: This Question is unanswered, help us to find answer for this one

124. For communications equipment, k stands for ________.

Answer

Correct Answer: 1000

Note: This Question is unanswered, help us to find answer for this one

125. For bi analysis, data need to represent the proper ________, the proper level of detail.

Answer

Correct Answer: Granularity

Note: This Question is unanswered, help us to find answer for this one

126. Backup and recovery against computer security threats are ________.

Answer

Correct Answer: Data safeguards

Note: This Question is unanswered, help us to find answer for this one

127. Adaptive maintenance ____

Answer

Correct Answer: Adds enhancements to an operational system and makes the system easier to use

Note: This Question is unanswered, help us to find answer for this one

128. A ________ is a hierarchical arrangement of criteria that predict a classification or a value.

Answer

Correct Answer: A decision tree

Note: This Question is unanswered, help us to find answer for this one

129. _____ is a term used to describe unpredictable, but highly impactful events.

Answer

Correct Answer: Black swans

Note: This Question is unanswered, help us to find answer for this one

130. The need for collaboration is greatest for ________ decisions.

Answer

Correct Answer: Strategic.

Note: This Question is unanswered, help us to find answer for this one

131. The field in a table that is used to relate that table to other tables is called the ____.

Answer

Correct Answer: Primary key

Note: This Question is unanswered, help us to find answer for this one

132. The fiber-optic cables that span the globe over land and under sea make up the internet _____.

Answer

Correct Answer: Backbone

Note: This Question is unanswered, help us to find answer for this one

133. Security systems ultimately depend on the behavior of their ________.

Answer

Correct Answer: Users

Note: This Question is unanswered, help us to find answer for this one

134. Knowing the sparsity of a column helps you decide whether the use of ____ is appropriate.

Answer

Correct Answer: An index

Note: This Question is unanswered, help us to find answer for this one

135. In a star schema, attributes are often used to search, filter, or classify ____.

Answer

Correct Answer: Facts

Note: This Question is unanswered, help us to find answer for this one

136. Fact and dimension tables are related by ____ keys.

Answer

Correct Answer: Foreign

Note: This Question is unanswered, help us to find answer for this one

137. Computers that reside in different geographic locations are connected using a(n) ________.

Answer

Correct Answer: WAN

Note: This Question is unanswered, help us to find answer for this one

138. Computed or derived facts are sometimes called ____ to differentiate them from stored facts.

Answer

Correct Answer: Metrics

Note: This Question is unanswered, help us to find answer for this one

139. A(n) _____ is a logical grouping of related fields.

Answer

Correct Answer: Record

Note: This Question is unanswered, help us to find answer for this one

140. To analzye various alternative scenarios, a manager would use _______.

Answer

Correct Answer: The spreadsheet's 'what-if' capability

Note: This Question is unanswered, help us to find answer for this one

141. Traditional data formats change ______ while big data formats change _______.

Answer

Correct Answer: Slowly, rapidly

Note: This Question is unanswered, help us to find answer for this one

142. The functions of a data warehouse are to do all of the following, except ________.

Answer

Correct Answer: Filter data

Note: This Question is unanswered, help us to find answer for this one

143. The control dimension of a global information system requires a(n) _____ architecture for data.

Answer

Correct Answer: Centralized

Note: This Question is unanswered, help us to find answer for this one

144. Technology is the essential foundation of an effective information security program. _____________

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

145. The software and procedure components of the is framework are both ________.

Answer

Correct Answer: Sets of instructions

Note: This Question is unanswered, help us to find answer for this one

146. Thin-client applications are typically limited by the capabilities of the ________.

Answer

Correct Answer: Browser.

Note: This Question is unanswered, help us to find answer for this one

147. The dimension of ________ in information quality describes whether data is available when needed.

Answer

Correct Answer: Timeliness

Note: This Question is unanswered, help us to find answer for this one

148. The dimension of ________ describes whether data elements are consistently defined.

Answer

Correct Answer: Consistency.

Note: This Question is unanswered, help us to find answer for this one

149. Value chains determine ________.

Answer

Correct Answer: Structured business processes

Note: This Question is unanswered, help us to find answer for this one

150. Your organization can choose one of ________ alternative competitive strategies.

Answer

Correct Answer: Four

Note: This Question is unanswered, help us to find answer for this one

151. The primary models used for oo detailed design are ____ diagrams.

Answer

Correct Answer: Design class and interaction

Note: This Question is unanswered, help us to find answer for this one

152. One of the goals of business intelligence is to _________.

Answer

Correct Answer: Present the results in an easy to understand manner

Note: This Question is unanswered, help us to find answer for this one

153. Measuring performance and __________ are parts of the foundation of any control system.

Answer

Correct Answer: Taking corrective action

Note: This Question is unanswered, help us to find answer for this one

154. Information systems provide a competitive advantage by all of the following, except ________.

Answer

Correct Answer: By collecting and storing large amounts of data

Note: This Question is unanswered, help us to find answer for this one

155. In the ____ model, each record can have multiple parent and child records.

Answer

Correct Answer: Network model

Note: This Question is unanswered, help us to find answer for this one

156. Data type helps a database management system (dbms) to ________.

Answer

Correct Answer: Allocate storage space

Note: This Question is unanswered, help us to find answer for this one

157. Adware and spyware are similar to each other in that they both ________.

Answer

Correct Answer: Reside in the background and observe a user's behavior

Note: This Question is unanswered, help us to find answer for this one

158. A group of similar rows or records is known as ________.

Answer

Correct Answer: Table

Note: This Question is unanswered, help us to find answer for this one

159. A building, office equipment, computer hardware, and network equipment are examples of _____.

Answer

Correct Answer: Capital assets

Note: This Question is unanswered, help us to find answer for this one

160. ________ specifies the characteristics of a field, such as the type of data it will hold.

Answer

Correct Answer: Data definition

Note: This Question is unanswered, help us to find answer for this one

161. ________ involve the people and procedure components of information systems.

Answer

Correct Answer: Human safeguards

Note: This Question is unanswered, help us to find answer for this one

162. ________ deals with more objective, rational, and technical knowledge.

Answer

Correct Answer: Explicit knowledge

Note: This Question is unanswered, help us to find answer for this one

163. _____ is an example of an enterprise-class electronic software.

Answer

Correct Answer: Oracle E-Business Suite

Note: This Question is unanswered, help us to find answer for this one

164. _____ are an example of internal source of data for an information system.

Answer

Correct Answer: Personnel records

Note: This Question is unanswered, help us to find answer for this one

165. ____ uses multiple sources of information and provides multidimensional analysis.

Answer

Correct Answer: OLAP

Note: This Question is unanswered, help us to find answer for this one

166. ____ rules specify which users have what type of access to which data in the database.

Answer

Correct Answer: Authorization

Note: This Question is unanswered, help us to find answer for this one

167. ____ refers to identifying the browser used by each visitor, typically via javascript code.

Answer

Correct Answer: Browser sniffing

Note: This Question is unanswered, help us to find answer for this one

168. ____ provide(s) an employee more control over his or her work situation.

Answer

Correct Answer: Job enrichment

Note: This Question is unanswered, help us to find answer for this one

169. ____ policy creates standards for using corporate e-mail.

Answer

Correct Answer: E-mail

Note: This Question is unanswered, help us to find answer for this one

170. ____ is a process for controlling changes in system requirements during software development.

Answer

Correct Answer: Configuration management

Note: This Question is unanswered, help us to find answer for this one

171. ____ implies that no site should depend on another site to perform its database functions.

Answer

Correct Answer: Local autonomy

Note: This Question is unanswered, help us to find answer for this one

172. ____ generally uses internal data and responds in real time.

Answer

Correct Answer: OLTP

Note: This Question is unanswered, help us to find answer for this one

173. ____ converts a table that is in third normal form to a table no longer in third normal form.

Answer

Correct Answer: Denormalization

Note: This Question is unanswered, help us to find answer for this one

174. ____ are normally expressed in the form of rules.

Answer

Correct Answer: Constraints

Note: This Question is unanswered, help us to find answer for this one

175. ____ consists of predrawn electronic images.

Answer

Correct Answer: Clip art

Note: This Question is unanswered, help us to find answer for this one

176. Routines performed to verify input data and correct errors prior to processing are known as

Answer

Correct Answer: Edit checks

Note: This Question is unanswered, help us to find answer for this one

177. Which of the following is most likely to rely on parallel processing?

Answer

Correct Answer: Supercomputer

Note: This Question is unanswered, help us to find answer for this one

178. Which of the following are included in an MIS audit?

Answer

Correct Answer: Physical facilities - telecommunications - control systems - and manual procedures

Note: This Question is unanswered, help us to find answer for this one

179. Each of the following is a rule of thumb for handling graphics in desktop publishing application EXCEPT

Answer

Correct Answer: Using serif typefaces in graph labels

Note: This Question is unanswered, help us to find answer for this one

180. A transmission over a telecommunications network in which data can flow two ways - but in only one direction at a time - is described as

Answer

Correct Answer: Half duplex

Note: This Question is unanswered, help us to find answer for this one

181. _____ tools is a project management technique that structures and sequences tasks - and budgets the time - money - and technical resources required to complete these tasks.

Answer

Correct Answer: Formal planning

Note: This Question is unanswered, help us to find answer for this one

182. The predefined packet of data in some LANs - which includes data indicating the sender - receiver - and whether the packet is in use - is known as a

Answer

Correct Answer: Token

Note: This Question is unanswered, help us to find answer for this one

183. Which of the following concerns is addressed by front-end CASE (computer-assisted software engineering) tools?

Answer

Correct Answer: Analysis

Note: This Question is unanswered, help us to find answer for this one

184. In an individual MIS - the most commonly-used technique for conducting operations research is ______ programming.

Answer

Correct Answer: Linear

Note: This Question is unanswered, help us to find answer for this one

185. Which of the following storage media generally has the slowest access speed?

Answer

Correct Answer: Magnetic disk

Note: This Question is unanswered, help us to find answer for this one

186. A processing system rejects an order transaction for 10 -000 units - on the basis that no order larger than 70 units had been placed previously. This is an example of a

Answer

Correct Answer: Reasonableness check

Note: This Question is unanswered, help us to find answer for this one

187. In its current form - the technology of electronic data interchange (EDI) is appropriate for transmitting all of the following EXCEPT

Answer

Correct Answer: Solicitations

Note: This Question is unanswered, help us to find answer for this one

188. Which of the following types of applications is generally most dependent on the graphical user interface (GUI) environment?

Answer

Correct Answer: Desktop publishing

Note: This Question is unanswered, help us to find answer for this one

189. The representation of data as they appear to an application programmer or end user is described as a(n) _____ view.

Answer

Correct Answer: Logical

Note: This Question is unanswered, help us to find answer for this one

190. Which of the following types of organizations is LEAST likely to make use of a hierarchical database?

Answer

Correct Answer: Consultancies/service organizations

Note: This Question is unanswered, help us to find answer for this one

191. The most time-consuming element of system conversion plans is

Answer

Correct Answer: Data conversion

Note: This Question is unanswered, help us to find answer for this one

192. Which of the following is NOT a type of knowledge work system (KWS)?

Answer

Correct Answer: Decision support system (DSS)

Note: This Question is unanswered, help us to find answer for this one

193. The predominant programming language for business was

Answer

Correct Answer: COBOL

Note: This Question is unanswered, help us to find answer for this one

194. When all the elements in a system are in the same category - ______ is said to be at a minimum.

Answer

Correct Answer: Uncertainty

Note: This Question is unanswered, help us to find answer for this one

195. Which of the following styles of systems development is most often used for information systems at the enterprise level?

Answer

Correct Answer: Traditional life cycle

Note: This Question is unanswered, help us to find answer for this one

196. Which of the following signifies the international reference model for linking different types of computers and networks?

Answer

Correct Answer: OSI

Note: This Question is unanswered, help us to find answer for this one

197. Of the following file organization methods - the only one that can be used on magnetic tape is

Answer

Correct Answer: Sequential

Note: This Question is unanswered, help us to find answer for this one

198. Which of the following systems exists at the strategic level of an organization?

Answer

Correct Answer: Executive support system (ESS)

Note: This Question is unanswered, help us to find answer for this one

199. Which of the following steps in the business systems planning (BSP) process is typically performed FIRST?

Answer

Correct Answer: Defining business processes

Note: This Question is unanswered, help us to find answer for this one

200. Which of the following is a shared network service technology that packages data into bundles for transmission but does not use error correction routines?

Answer

Correct Answer: Frame relay

Note: This Question is unanswered, help us to find answer for this one

201. In what type of processing can more than one instruction be processed at once - by breaking down a problem into smaller parts and processing them simultaneously?

Answer

Correct Answer: Parallel

Note: This Question is unanswered, help us to find answer for this one

202. In most organizations - the chief information officer is given a rank equivalent to

Answer

Correct Answer: Vice president

Note: This Question is unanswered, help us to find answer for this one

203. Which of the following is a commercial digital information service that exists to provide business information?

Answer

Correct Answer: Dialog

Note: This Question is unanswered, help us to find answer for this one

204. Which of the following is an object-oriented programming language that can deliver only the software functionality needed for a particular task - and which can run on any computer or operating system?

Answer

Correct Answer: Java

Note: This Question is unanswered, help us to find answer for this one

205. According to Simon's description - there are four stages in any decision-making process. Decision support systems are designed primarily to help monitor the ______ stage.

Answer

Correct Answer: Implementation

Note: This Question is unanswered, help us to find answer for this one

search
Management Information Systems (MIS) Subjects