Management Information System (MIS) – Set 3 January 29, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Management Information System (MIS) – Set 3 Dear ! This is Management Information System (MIS) – Set 3 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) In overall business side the MIS planning initiates from business _____. Task Event Planning Operations 2 / 50 2) Expert System contains _____________. Database Modelbase Knowledgebase All of these 3 / 50 3) _____________________ is unauthorized use, access, modification, and destruction of hardware, software, data, or network resources Hacking Computer Crime Spoofing Sniffer 4 / 50 4) ______________ is unauthorized copying of software. Software Piracy Trojan Horse Trojan Horse Packet Sniffer 5 / 50 5) TPS means ____________. Transaction Plan Master Transaction Processing System Transport Plan Management All of these 6 / 50 6) Security systems based on physical or behavioral traits are called ________________. Smart cards Tokens Firewalls Biometrics 7 / 50 7) The major source of data for other systems is __________________. ESS DSS MIS TPS 8 / 50 8) In a firm the reports are generated under condition are called _____ reports. exception condition standard periodic 9 / 50 9) ____ sub system deals with activities as purchasing, receiving inventory control and distribution Marketing Purchase Sales Logistics 10 / 50 10) The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver is called _________________. Demodulation Filtering Encryption Stateful inspection 11 / 50 11) An instruction in a computer program that triggers a malicious act is called as ____________. Logic Bombs Packet Sniffer Hacking Computer Crime 12 / 50 12) In database handling ____ reports used by software for data. Condition Specific Periodic Demand 13 / 50 13) Electronic Filing, Voice Mail are the reponsibilities of _______________. Office Automation System Transaction Processing System Expert System Executive Support System 14 / 50 14) ________________ is a program code that cannot work without being inserted into another program. Worm Virus Sniffer Spoofing 15 / 50 15) _____________ is a distinct program that can run unaided. Worm Virus Sniffer Spoofing 16 / 50 16) In general the information system can also describe in terms of ____. Operations Functions events tasks 17 / 50 17) _________________ is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or the entire contents. Hacking Computer Crime Trojan Horse Packet Sniffer 18 / 50 18) The analysis and design of application systems are the responsibility of a ___________. Computer Operator Programmer System Analyst Data entry operator 19 / 50 19) An ________________ system has a stored knowledge base and an inference engine. Expert Centers Control MIS 20 / 50 20) Critical information for top management is provided by ____ information system. Expert Executive Decision Managerial 21 / 50 21) __________ type of budgeting is based on estimation of total project cost by the top management. top-down bottom-up neural zero-based 22 / 50 22) ________________ is a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software. Hacking Computer Crime Trojan Horse Sniffer 23 / 50 23) The results of “what-if” questions asked repeatedly to determine the impact of changes in one or more factors on the outcomes are called__________________. Data modeling Forecasting Classification clusters Sensitivity analysis 24 / 50 24) Acquiring, training and retaining good network _____ should be a top priority. data entry lab in charge Administrator system tester 25 / 50 25) The project team is composed of the system professional are directly responsible for _____ the system testing building deleting innovating 26 / 50 26) __________ charts are used to represent the project tasks and durations. Gantt X ray Bar Scatter 27 / 50 27) ______ type of feasibility deals with the costs of both development and operations of the system. Economic Motivational Technical Schedule 28 / 50 28) In any real time system ___ factors are termed as boundaries of the system. Statement Conditions Blocks Limit 29 / 50 29) The operating decisions resulting actions usually cover ____ periods. Medium short time over an year long time 30 / 50 30) The overall recruit process will be control by _____ person HR Manager GM In charge 31 / 50 31) A _______ evaluation process reduces the possibility of buying inadequate hardware. Stable Formal Unstable Informal 32 / 50 32) The most advanced graphics software in any system used by management is normally found in __________________. TPS ESS Intranets Enterprise systems 33 / 50 33) MIS can provide ______________. Past information Present information Future information All of these 34 / 50 34) A manufacturing company products may decide to diversify into ____ lines. Price Demand Consumer Product 35 / 50 35) RFP stands for ______. Request for Proposal Request for Process Request for Product Request for Prediction 36 / 50 36) ______________________ decision support system that provides support for decision making by groups of people Group Decision Support System (GDSS) Decision Support System (DSS) Groupware Software Graphics Software 37 / 50 37) _________________ is an area of philosophy concerned with developing ethical principles and promoting ethical behavior and practices in the accomplishment of business tasks and decision making. Business Ethics Behavioral stage Ethical values Equity 38 / 50 38) Decision varies as to the ____ structure within each level of management. Degree Data Situation Order 39 / 50 39) Managers can receive information from _____ that supports their decision making systems. Workstations personal system Reports File 40 / 50 40) The process of helping users see patterns and relationships in large amounts of data by presenting the data in graphical form is called __________________. Geographic information system Decision support system Data visualization An optimization model 41 / 50 41) ATG in network stands for ____. Advanced Technology Groups Advanced Technical Groups Advanced Talent Groups Advanced Testing Groups 42 / 50 42) Information System specialists also called as ______. user consultant user friendly user expert user manager 43 / 50 43) A type of decision in which there may be several “right” answers and no precise way to get a right answer is ____________________. Structured decision Unstructured decision Recurring decision Nonrecurring decision 44 / 50 44) AIS stands for _______. Account Interactive System Accounting Inactive system Account In System Accounting Information Systems 45 / 50 45) ___ models to analysis a problem and provides possible solution for management evaluation Decision Standard Structural Periodic 46 / 50 46) ___ sub system covers granting of credit and cost management Accounting Purchase Personnel Sales 47 / 50 47) ECS means ___________________. Enterprise Collaboration System Economical Calculation Service Enterprise Communication System Economical Communication Service 48 / 50 48) ________ steps ensure the success of the new systems Initial Implementation Testing Design 49 / 50 49) The total process of a system is the net contribution of ____ individual process in the design. Three Many Equal to two One 50 / 50 50) ________________ is obsessive use of a computer or unauthorized access and use of computer systems. Hacking Computer Crime Trojan Horse Packet Sniffer Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback