MIS MCQs
MIS MCQs
MIS MCQs
A. internal source
B. external source
C. both internal and external source
D. none of the above
C.both internal and external source
A. information
B. employee
C. management
D. capital
A.information
A. need dependent
B. organization dependent
C. information dependent
D. management dependent
A.need dependent
A. service sector
B. banking sector
C. agriculture sector
D. all of the above
A.service sector
A. customer
B. employee
C. supplier
D. none of the above
C.supplier
A. database
B. model base
C. dss software system
D. all of the above
D.all of the above
9. GDSS is the short form of
A. bottom to top
B. left to right
C. top to bottom
D. all of the above
D.all of the above
A. simulation
B. what-if analysis
C. optimization
D. goal-seeking analysis
B.what-if analysis
A. systems analysis
B. creative analysis
C. critical analysis
D. organizational analysis
B.creative analysis
A. traditional
B. classical
C. operational
D. absolute
B.classical
A. team.
B. project.
C. formal.
D. informal.
C.formal.
A. explicitness.
B. completeness.
C. accuracy.
D. exception based.
A.explicitness.
A. expert.
B. executive.
C. decision.
D. managerial.
B.executive.
20. who have concerned with tactical (short-term) operational problems and
decision making ?
A. supervisors
B. mobile managers
C. middle managers
D. executive managers
E. none of the above
F. both A & b
26. Information systems that support the business functions that reach out to
suppliers are known as:
A. decision support systems
B. expert information systems
C. back-office information systems
D. front office information systems
E. none of the above
F. both A & b
29. From the options below, which of them is not a vulnerability to information
security?
a) flood
b) without deleting data, disposal of storage media
c) unchanged default password
d) latest patches and updates not done
30. _____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive
31. Which of the following information security technology is used for avoiding
browser-based hacking?
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser
A. Are the systems responsible for the provision of information for management.
B. They incorporate IT, people, business processes and procedures used to
manage the capture and communication of information.
C. They involve complex and dynamic interaction between people, technology
and process to ensure the delivery of appropriate and timely information to
management.
D. All of the above
37.An effective IS (Information system) should have various logs that
individuals examine regularly and take appropriate action on when necessary.
Examples of logs include:
A. Data entry staff should keep full details of each batch of work, with duration
and errors.
B. Backups, storage of data off-site should be logged
C. Software application systems may generate their own logs of errors
D. All of the above
38.A security sub-system could maintain detailed logs of who did what and
when and also if there were any attempted security violations.
A. True
B. False
39.Quality management is the means by which IS (Information system)
department-based processes are controlled, measured and improved. Areas of
control for quality management include: