MCQ On Management Information System

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

MCQ

On
Management Information System

1. Management information systems (MIS)


1. Create and share documents that support day-today office activities
2. Process business transactions (e.g., time cards, payments, orders, etc.)
3. Capture and reproduce the knowledge of an expert problem solver
4. Use the transaction data to produce information needed by managers to run the business
5. None of the above

2. The term used to describe those people whose jobs involve sponsoring and funding the project
to develop, operate, and maintain the information system is
1. Information worker
2. Internal system user
3. Systems owner
4. External system user
5. Systems builder

3. The person who ensures that systems are developed on time, within budget, and with
acceptable quality is a
1. Systems designer
2. Project manager
3. Systems owner
4. External system user
5. Systems builder

4. Which one of the following is not a business driver for an information system?
1. Business process redesign
2. Knowledge asset management
3. Proliferation of networks and the internet
4. Security and privacy
5. Collaboration and partnership

5. A task of developing a technical blueprint and specifications for a solution that fulfills the
business requirements is undertaken in the following phase of the system development process
1. System initiation
2. System implementation
3. System analysis
4. System design
5. Feasibility analysis
6. If a university sets up a web-based information system that faculty could access to record
student grades and to advice students, that would be an example of a/an
1. CRM
2. Intranet
3. ERP
4. Extranet
5. None of the above

7. Which of the following is not a technology driver for an information system?


1. Enterprise applications
2. Object technologies
3. Knowledge asset management
4. Collaborative technologies
5. Networks and the Internet

8. Which of the following is a deliverable of the system implementation phase in a formal system
development process?
1. Technical hardware and software solution for the business problem
2. Business problem statement
3. Statement of the system users’ business requirements
4. Technical blueprint and specifications for a solution that fulfills the business requirements
5. None of the above

9. An information system that supports the planning and assessment needs of executive
management is
1. DSS
2. TPS
3. ERP
4. MIS
5. None of the above

10. Decision makers who are concerned with tactical (short-term) operational problems and
decision making are
1. Middle managers
2. Executive managers
3. Supervisors
4. Mobile managers
5. None of the above

11. The application of information to scan an organization’s environment is:


1. External communication.
2. Information overload.
3. Sensing.
4. Internal communication.
5. None of the above.

12. When a bank uses information to launch a personalized credit card product this:
1. Manages risks.
2. Creates a new opportunity.
3. Adds value.
4. Reduces costs.
5. None of the above.

13. When a bank uses business performance management software to monitor its performance in
differences regions this:
1. Reduces costs.
2. Manages risks.
3. Adds value.
4. Creates a new opportunity.
5. None of the above.

14. When a bank offers web self-service for customers to answer their questions, the primary
outcome is:
1. Adds value.
2. Manages risks.
3. Reduces costs.
4. Creates a new opportunity.
5. None of the above.

15. The general transformation cycle for information is:


1. Information to data to knowledge.
2. Knowledge to data to information.
3. Data to knowledge to information.
4. Data to information to knowledge.
5. None of the above.

16. The most important attribute of information quality that a manager requires is:
1. Relevance.
2. Media.
3. Presentation.
4. Timeliness.
5. None of the above.

17. To improve the performance of a business process, which of the following is most relevant?
1. Input.
2. Processing.
3. All of the above.
4. Control and feedback
5. Output.

18. Monitoring the legal constraints which a company operates under requires review of:
1. A company’s customers.
2. A company’s outputs.
3. A company’s macro-environment.
4. A company’s micro-environment.
5. All of the above.

19. The majority of publically available Internet information sources are:


1. Created in XML.
2. Structured information.
3. Normal information.
4. Unstructured information.
5. None of the above.

20. Records management:


1. Is a discipline limited to digitized paper documents?
2. Is a discipline limited to library books?
3. Is a discipline limited to paper documents?
4. Is a discipline limited to information contained in databases?
5. None of the above.

21. Which of the following should be represented on an information flow diagram?


1. Entity
2. Source
3. Process
4. Attribute
5. Database

22. A web blueprint depicts:


1. The layout of an individual web page
2. The layout of the home page
3. The layout of an index page
4. The layout of a website
5. The layout of a sitemap

23. UML depicts information systems as a collection of:


1. Entities
2. Processes
3. Data
4. Information
5. Objects

24. Which of the following statements describes a taxonomy


1. A browsable hierarchy
2. A list of equivalent terms
3. A complex controlled vocabulary showing relationships

25. Which of the following statements about XML schemas is incorrect?


1. Schemas can specify integer values
2. Schemas are defined by XSD tag
3. All XML documents must have a schema
4. Schemas provide data oriented data types
5. They offer more flexibility than DTDs

26. Which of the following relates to enterprise interoperability?


1. DFD
2. Information flow diagram
3. XML
4. Entity relationship diagram

27. Which of the following is not a type of navigation system for a web site?
1. National
2. Global
3. Contextual
4. Local
5. Regional

28. What should not be part of an acceptable use policy?


1. Allowable use of systems
2. Legal obligations
3. Encryption policies
4. User responsibilities
5. Account and password responsibilities
29. Use-case analysis focuses upon:
1. Data
2. Objects
3. Entities
4. Actors

30. Which of the following is part of a static view of information?


1. Logical data model
2. Meta data
3. Data flow model
4. Information process model

31. Contemporary Information Systems are interfacing with customers and suppliers using:
1. BPR
2. CRM
3. SCM
4. Both A and B
5. Both B and C

32. Information systems that support the business functions that reach out to suppliers are known
as:
1. back office information systems
2. Decision support systems
3. Expert information systems
4. Front office information systems
5. None of the above

33. Which of the following is not a class of information system applications?


1. Database management system
2. Decision support system
3. Expert system
4. Management information system
5. Office automation system

34. Who are the people that actually use the system to perform or support the work to be
completed?
1. System analysts
2. System designers
3. System owners
4. System builders
5. None of the above

35. Which is not a typical business function?


1. Sales
2. Service
3. Manufacturing
4. Accounting
5. Benefits and Compensation

36. The flow of transactions through business processes to ensure appropriate checks and
approvals are implemented is called:
1. Procedures
2. Work flow
3. Process flow
4. Process requirements
5. Procedures

37. Language-based, machine-readable representations of what a software process is supposed to


do, or how a software process is supposed to accomplish its task is known as:
1. Prototyping
2. Software specifications
3. Application programs
4. Human engineering
5. None of the above

38. A specification of how the user moves from window to window, interacting with the
application programs to perform useful work is called:
1. Interface specifications
2. Software specifications
3. User dialog
4. Prototyping specifications
5. Navigation specification

39. Examples of keyless interfaces include:


1. Bar coding, OCR, pen, and voice recognition
2. Mouse, OCR, pen, and voice recognition
3. Keyboard, OCR, pen, and voice recognition
4. All of the above
5. None of the above

40. Open database connectivity (OBDC) tools are an example of:


1. Layer ware
2. Tool kit
3. Interface ware
4. Middle ware
5. None of the above

41. The first CMM level at which measurable goals for quality and productivity are established is
1. Level 1
2. Level 2
3. Level 3
4. Level 4
5. Level 5

42. Project Management ensures that


1. Project’s risk is assessed
2. Project’s feasibility is assessed
3. System is developed at minimum cost
4. Both a and b
5. None of the above

43. The deliverable of the problem analysis phase is


1. System improvement objectives
2. Problem statement
3. Statement of constraints
4. Statement of work
5. None of the above

44. Which one is NOT a category of problems represented by the PIECES framework?
1. Control
2. Efficiency
3. Service
4. Economics
5. Technology

45. Which one is NOT a phase of the systems development life cycle?
1. Problem analysis
2. Scope definition
3. Requirements analysis
4. Post-implementation review
5. Decision analysis
46. A cross life-cycle activity of system development is
1. Object modeling
2. Prototyping
3. Fact-finding
4. Data modeling
5. Data flow diagram modeling

47. An ongoing activity of systems support is


1. Assisting users
2. Adapting the system to new requirements
3. Recovering the system
4. Fixing software defects
5. All of the above

48. Rapid Application Development (RAD) strategy includes all of the following, except
1. Actively involves system users in the analysis, design, and construction activities
2. Uses waterfall development approach to evolve system concept
3. Organizes systems development into a series of focused, intense workshops
4. Reduces the amount of time that passes before the users begin to see a working system
5. Accelerates the requirements analysis and design phases

49. Request for quotation (RFQ) is


1. A document that compares business and technical requirements of a commercial application
package against the capabilities and features of a specific commercial application package
2. A document that communicates business, technical, and support requirements for an
application software package to vendors that wishes to compete for the sale of that application
package and services
3. A document that communicates business, technical, and support requirements for an
application software package to a single vendor that has been determined as being able to
supply that application package and service
4. A contract with management and the user community to develop or enhance an information
system
5. None of the above

50. Which of the following phases is unique to the commercial application package
implementation strategy as opposed to the rapid application development strategy?
1. Problem analysis
2. Construction and testing
3. Scope definition
4. Requirements analysis
5. Business process design

You might also like