MIS MCQs

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

1.

The information of MIS comes from the

A. internal source
B. external source
C. both internal and external source
D. none of the above
C.both internal and external source

2.The back bone of any organization is

A. information
B. employee
C. management
D. capital
A.information

3.The flow of information through MIS is

A. need dependent
B. organization dependent
C. information dependent
D. management dependent
A.need dependent

4.The elements of control will consist of

A. authority, direction, management


B. authority, direction, information
C. authority, application, management
D. authority, application, information
A.authority, direction, management
5.Internal information for MIS may come from any one of the following
department.

A. customers care department


B. hr department
C. marketing department
D. production department
A.customers care department

6. MIS normally found in a manufacturing organization will not be suitable in the


______.

A. service sector
B. banking sector
C. agriculture sector
D. all of the above
A.service sector

7.  _______ details are given by Management to Marketing Service System.

A. customer
B. employee
C. supplier
D. none of the above
C.supplier

8. The basic component(s) of DSS is (are)

A. database
B. model base
C. dss software system
D. all of the above
D.all of the above
9. GDSS is the short form of

A. group decision support system


B. group discussion support system
C. group decision service system
D. group discussion support source
A.group decision support system

10. Decision trees could be represented in different ways such as

A. bottom to top
B. left to right
C. top to bottom
D. all of the above
D.all of the above

11. The types of data transmission modes are

A. half duplex. , duplex. , singlex


B. half duplex. , duplex. , simplex
C. half duplex. , duplex. , half singlex
D. singlex, duplex, half triplex
B.half duplex. , duplex. , simplex

12. Using ______________ a decision maker can make hypothetical changes to


problem data and observe theimpact on the results

A. simulation
B. what-if analysis
C. optimization
D. goal-seeking analysis
B.what-if analysis

13.  ______________ involves the investigation of new approaches to existing


problems.

A. systems analysis
B. creative analysis
C. critical analysis
D. organizational analysis
B.creative analysis

14. Which of the following is NOT a goal of transaction processing systems?

A. capture, process, and store transactions


B. produce a variety of documents related to routine business activities
C. reduce manual effort associated with processing business transactions
D. produce standard reports used for management decision making
D.produce standard reports used for management decision making

15. In ______________ organization, authority is delegated down the hierarchy.

A. traditional
B. classical
C. operational
D. absolute
B.classical

16. The starting point of MIS planning is general ______________ planning.


A. objective.
B. managers.
C. business.
D. firms.
C.business.

17. ______________ leader who commands both positional and personal


influence. Team.

A. team.
B. project.
C. formal.
D. informal.
C.formal.

18.  ______________ is a prominent attribute of management information


procured through MIS of an organization.

A. explicitness.
B. completeness.
C. accuracy.
D. exception based.
A.explicitness.

19. Critical information for top management is provided by ______________


information system.

A. expert.
B. executive.
C. decision.
D. managerial.
B.executive.

20.  who have concerned with tactical (short-term) operational problems and
decision making ?
A. supervisors
B. mobile managers
C. middle managers
D. executive managers
E. none of the above
F. both A & b

21. Management information systems (MIS)


A. Development and share documents that support day-today office activities.
B. process business transactions (e.g., time cards, payments, orders, ecapture and
reproduce the knowledge of an expert problem solver
C. use the transaction data to produce information needed by managers to
run the business
D. none of the above

22. Which one is the organizations Back Bone?


A. capital
B. employee
C. management
D. information
E. both A and B

23. _________ is the general transformation cycle for information?


A. data to information to knowledge.
B. data to knowledge to information.
C. knowledge to data to information.
D. information to data to knowledge
E. none of the above.
F. both A & b.

24. _______ represented an information flow diagram?


A. Source
B. Entity
C. Attribute
D. Process
E. Database
F. none of these
25. _______ is a part of a static view of information?
A. Metadata
B. Logical data model
C. Data flow model
D. Information process model
E. both A & b
F. None of these

26. Information systems that support the business functions that reach out to
suppliers are known as:
A. decision support systems
B. expert information systems
C. back-office information systems
D. front office information systems
E. none of the above
F. both A & b

27. 1. _______ is the practice and precautions taken to protect valuable


information from unauthorised access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
28. From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
d) Unchanged default password

29. From the options below, which of them is not a vulnerability to information
security?
a) flood
b) without deleting data, disposal of storage media
c) unchanged default password
d) latest patches and updates not done

30.  _____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive

31.  Which of the following information security technology is used for avoiding
browser-based hacking?
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser

32. Compromising confidential information comes under _________


a) Bug
b) Threat
c) Vulnerability
d) Attack

33. Lack of access control policy is a _____________


a) Bug
b) Threat
c) Vulnerability
d) Attack

34. Possible threat to any information cannot be ________________


a) reduced
b) transferred
c) protected
d) ignored

35. Information Technology –


A. Describes any equipment concerned with the capture, storage, transmission or
presentation of information.
B. Is referred to as ICT (Information Communications Technology), emphasizing
the importance of communications.
C. Both A&B
D. None

36.Information systems (ISs) –

A. Are the systems responsible for the provision of information for management.
B. They incorporate IT, people, business processes and procedures used to
manage the capture and communication of information.
C. They involve complex and dynamic interaction between people, technology
and process to ensure the delivery of appropriate and timely information to
management.
D. All of the above
37.An effective IS (Information system) should have various logs that
individuals examine regularly and take appropriate action on when necessary.
Examples of logs include:

A. Data entry staff should keep full details of each batch of work, with duration
and errors.
B. Backups, storage of data off-site should be logged
C. Software application systems may generate their own logs of errors
D. All of the above
38.A security sub-system could maintain detailed logs of who did what and
when and also if there were any attempted security violations.

A. True
B. False
39.Quality management is the means by which IS (Information system)
department-based processes are controlled, measured and improved. Areas of
control for quality management include:

A. Software development, maintenance and implementation


B. Acquisition of hardware and software
C. Security and Human resource management
D. All of the above
40.Which of the following is correct?

A. The development and maintenance of comprehensive procedures by the IS


department is evidence of effective governance of IT resources.
B. Insistence on observance of processes and procedures is key to the
effectiveness and efficiency of the IS organization.
C. Both A&B
D. None

You might also like