Management Information System (MIS) – Set 3

0%

Report a question

You cannot submit an empty report. Please add some details.

Management Information System (MIS) – Set 3

Dear ! This is Management Information System (MIS) – Set 3 Quiz and it contains 50 questions.


Keep Learning!

1 / 50

1) A type of decision in which there may be several “right” answers and no precise way to get a right answer is ____________________.

2 / 50

2) An instruction in a computer program that triggers a malicious act is called as ____________.

3 / 50

3) In general the information system can also describe in terms of ____.

4 / 50

4) In overall business side the MIS planning initiates from business _____.

5 / 50

5) An ________________ system has a stored knowledge base and an inference engine.

6 / 50

6) TPS means ____________.

7 / 50

7) In any real time system ___ factors are termed as boundaries of the system.

8 / 50

8) AIS stands for _______.

9 / 50

9) _________________ is an area of philosophy concerned with developing ethical principles and promoting ethical behavior and practices in the accomplishment of business tasks and decision making.

10 / 50

10) The results of “what-if” questions asked repeatedly to determine the impact of changes in one or more factors on the outcomes are called__________________.

11 / 50

11) ATG in network stands for ____.

12 / 50

12) The total process of a system is the net contribution of ____ individual process in the design.

13 / 50

13) A _______ evaluation process reduces the possibility of buying inadequate hardware.

14 / 50

14) ___ sub system covers granting of credit and cost management

15 / 50

15) The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver is called _________________.

16 / 50

16) Decision varies as to the ____ structure within each level of management.

17 / 50

17) ____ sub system deals with activities as purchasing, receiving inventory control and distribution

18 / 50

18) The analysis and design of application systems are the responsibility of a ___________.

19 / 50

19) ________________ is a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software.

20 / 50

20) The overall recruit process will be control by _____ person

21 / 50

21) _____________________ is unauthorized use, access, modification, and destruction of hardware, software, data, or network resources

22 / 50

22) _____________ is a distinct program that can run unaided.

23 / 50

23) Security systems based on physical or behavioral traits are called ________________.

24 / 50

24) ___ models to analysis a problem and provides possible solution for management evaluation

25 / 50

25) The most advanced graphics software in any system used by management is normally found in __________________.

26 / 50

26) ______ type of feasibility deals with the costs of both development and operations of the system.

27 / 50

27) The project team is composed of the system professional are directly responsible for _____ the system

28 / 50

28) The major source of data for other systems is __________________.

29 / 50

29) ECS means ___________________.

30 / 50

30) A manufacturing company products may decide to diversify into ____ lines.

31 / 50

31) ________________ is obsessive use of a computer or unauthorized access and use of computer systems.

32 / 50

32) MIS can provide ______________.

33 / 50

33) RFP stands for ______.

34 / 50

34) Expert System contains _____________.

35 / 50

35) Critical information for top management is provided by ____ information system.

36 / 50

36) _________________ is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or the entire contents.

37 / 50

37) Electronic Filing, Voice Mail are the reponsibilities of _______________.

38 / 50

38) The process of helping users see patterns and relationships in large amounts of data by presenting the data in graphical form is called __________________.

39 / 50

39) Information System specialists also called as ______.

40 / 50

40) ______________ is unauthorized copying of software.

41 / 50

41) The operating decisions resulting actions usually cover ____ periods.

42 / 50

42) ________ steps ensure the success of the new systems

43 / 50

43) ______________________ decision support system that provides support for decision making by groups of people

44 / 50

44) ________________ is a program code that cannot work without being inserted into another program.

45 / 50

45) In a firm the reports are generated under condition are called _____ reports.

46 / 50

46) In database handling ____ reports used by software for data.

47 / 50

47) Acquiring, training and retaining good network _____ should be a top priority.

48 / 50

48) __________ type of budgeting is based on estimation of total project cost by the top management.

49 / 50

49) Managers can receive information from _____ that supports their decision making systems.

50 / 50

50) __________ charts are used to represent the project tasks and durations.

Your score is

The average score is 0%

🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥
LinkedIn Facebook
0%

Exit

We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌

🌟 Thank you for your support! Your feedback means the world to us. 🙏💖

You cannot copy content of this page