Management Information System (MIS) – Set 3 January 29, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Management Information System (MIS) – Set 3 Dear ! This is Management Information System (MIS) – Set 3 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) A type of decision in which there may be several “right” answers and no precise way to get a right answer is ____________________. Structured decision Unstructured decision Recurring decision Nonrecurring decision 2 / 50 2) An instruction in a computer program that triggers a malicious act is called as ____________. Logic Bombs Packet Sniffer Hacking Computer Crime 3 / 50 3) In general the information system can also describe in terms of ____. Operations Functions events tasks 4 / 50 4) In overall business side the MIS planning initiates from business _____. Task Event Planning Operations 5 / 50 5) An ________________ system has a stored knowledge base and an inference engine. Expert Centers Control MIS 6 / 50 6) TPS means ____________. Transaction Plan Master Transaction Processing System Transport Plan Management All of these 7 / 50 7) In any real time system ___ factors are termed as boundaries of the system. Statement Conditions Blocks Limit 8 / 50 8) AIS stands for _______. Account Interactive System Accounting Inactive system Account In System Accounting Information Systems 9 / 50 9) _________________ is an area of philosophy concerned with developing ethical principles and promoting ethical behavior and practices in the accomplishment of business tasks and decision making. Business Ethics Behavioral stage Ethical values Equity 10 / 50 10) The results of “what-if” questions asked repeatedly to determine the impact of changes in one or more factors on the outcomes are called__________________. Data modeling Forecasting Classification clusters Sensitivity analysis 11 / 50 11) ATG in network stands for ____. Advanced Technology Groups Advanced Technical Groups Advanced Talent Groups Advanced Testing Groups 12 / 50 12) The total process of a system is the net contribution of ____ individual process in the design. Three Many Equal to two One 13 / 50 13) A _______ evaluation process reduces the possibility of buying inadequate hardware. Stable Formal Unstable Informal 14 / 50 14) ___ sub system covers granting of credit and cost management Accounting Purchase Personnel Sales 15 / 50 15) The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver is called _________________. Demodulation Filtering Encryption Stateful inspection 16 / 50 16) Decision varies as to the ____ structure within each level of management. Degree Data Situation Order 17 / 50 17) ____ sub system deals with activities as purchasing, receiving inventory control and distribution Marketing Purchase Sales Logistics 18 / 50 18) The analysis and design of application systems are the responsibility of a ___________. Computer Operator Programmer System Analyst Data entry operator 19 / 50 19) ________________ is a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software. Hacking Computer Crime Trojan Horse Sniffer 20 / 50 20) The overall recruit process will be control by _____ person HR Manager GM In charge 21 / 50 21) _____________________ is unauthorized use, access, modification, and destruction of hardware, software, data, or network resources Hacking Computer Crime Spoofing Sniffer 22 / 50 22) _____________ is a distinct program that can run unaided. Worm Virus Sniffer Spoofing 23 / 50 23) Security systems based on physical or behavioral traits are called ________________. Smart cards Tokens Firewalls Biometrics 24 / 50 24) ___ models to analysis a problem and provides possible solution for management evaluation Decision Standard Structural Periodic 25 / 50 25) The most advanced graphics software in any system used by management is normally found in __________________. TPS ESS Intranets Enterprise systems 26 / 50 26) ______ type of feasibility deals with the costs of both development and operations of the system. Economic Motivational Technical Schedule 27 / 50 27) The project team is composed of the system professional are directly responsible for _____ the system testing building deleting innovating 28 / 50 28) The major source of data for other systems is __________________. ESS DSS MIS TPS 29 / 50 29) ECS means ___________________. Enterprise Collaboration System Economical Calculation Service Enterprise Communication System Economical Communication Service 30 / 50 30) A manufacturing company products may decide to diversify into ____ lines. Price Demand Consumer Product 31 / 50 31) ________________ is obsessive use of a computer or unauthorized access and use of computer systems. Hacking Computer Crime Trojan Horse Packet Sniffer 32 / 50 32) MIS can provide ______________. Past information Present information Future information All of these 33 / 50 33) RFP stands for ______. Request for Proposal Request for Process Request for Product Request for Prediction 34 / 50 34) Expert System contains _____________. Database Modelbase Knowledgebase All of these 35 / 50 35) Critical information for top management is provided by ____ information system. Expert Executive Decision Managerial 36 / 50 36) _________________ is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or the entire contents. Hacking Computer Crime Trojan Horse Packet Sniffer 37 / 50 37) Electronic Filing, Voice Mail are the reponsibilities of _______________. Office Automation System Transaction Processing System Expert System Executive Support System 38 / 50 38) The process of helping users see patterns and relationships in large amounts of data by presenting the data in graphical form is called __________________. Geographic information system Decision support system Data visualization An optimization model 39 / 50 39) Information System specialists also called as ______. user consultant user friendly user expert user manager 40 / 50 40) ______________ is unauthorized copying of software. Software Piracy Trojan Horse Trojan Horse Packet Sniffer 41 / 50 41) The operating decisions resulting actions usually cover ____ periods. Medium short time over an year long time 42 / 50 42) ________ steps ensure the success of the new systems Initial Implementation Testing Design 43 / 50 43) ______________________ decision support system that provides support for decision making by groups of people Group Decision Support System (GDSS) Decision Support System (DSS) Groupware Software Graphics Software 44 / 50 44) ________________ is a program code that cannot work without being inserted into another program. Worm Virus Sniffer Spoofing 45 / 50 45) In a firm the reports are generated under condition are called _____ reports. exception condition standard periodic 46 / 50 46) In database handling ____ reports used by software for data. Condition Specific Periodic Demand 47 / 50 47) Acquiring, training and retaining good network _____ should be a top priority. data entry lab in charge Administrator system tester 48 / 50 48) __________ type of budgeting is based on estimation of total project cost by the top management. top-down bottom-up neural zero-based 49 / 50 49) Managers can receive information from _____ that supports their decision making systems. Workstations personal system Reports File 50 / 50 50) __________ charts are used to represent the project tasks and durations. Gantt X ray Bar Scatter Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback