MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Management
Management Information System (MIS)
Quiz 2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Q.1
A ___ is a binary event representing a signal change from positive to negative
Bit
Band
Bandwidth
Frequency
Q.2
Which type of system tracks day-to-day activities of an organization?
Transaction processing system (TPS)
Management information system (MIS)
Decision-support system (DSS)
Executive support system (ESS)
Q.3
____________ is a plastic card with a built-in microprocessor, used typically to perform financial transactions.
Smart cards
Tokens
Firewalls
Biometrics
Q.4
_______ type of cables uses the copper wire for data transmission
Fibre optics
Co-axial
Lead wire
Twisted pair
Q.5
In database, table is made of _______.
fields and records
data and information
cell and borders
text and images
Q.6
_______is (are) the important component(s) of DSS.
Dialogue Management
Model Management
Model Management
All the above
Q.7
Medium bans channels use ____ type of cables used for transmissions.
shielded twisted pair
unshielded twisted pair
fibre optics
co-axial
Q.8
Which of the following consists of all the hardware and software that a firm needs to achieve its business objectives?
Database technology
Networking technology
Storage technology
Information technology
Q.9
This type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender is _________________.
Digital signature
Symmetric key encryption
Public key encryption
Digital certificate
Q.10
______ type of cables need minimum numbers of repeaters
Fibre optic
Co-axial
Twisted pair
Lead wire
Q.11
A formal document would be classified as __________.
Data
Unstructured knowledge
Structured knowledge
Semistructured knowledge
Q.12
The ________ has no pre-established decision procedures.
Unstructured
Structured
Standard
Stable
Q.13
________ system can process data that are incomplete
Random
Neural
Fuzzy logic
Cognitive
Q.14
Common threats against information systems come from all of the following factors except ___________________.
Technical
Organizational
Governmental
Environmental
Q.15
A ______ is a communication processor that connects two similar LANs
Router
Bridge
Adapter
Hub
Q.16
A method of interacting with customers such as a Web site or a wireless device is called _____________.
Demand point
Customer service model
Sales force point
Touch point
Q.17
_____ duplex transmission can flow data in two ways but one direction at a time.
Full
Switch
Half
Circuit
Q.18
A network of organizations used for procuring raw materials, transforming these materials into products, and distributing the products to customers is called _____________________.
Value chain
Supply chain
Enterprise system
Process chain
Q.19
_____ configurations provide extremely a fast transmission between workstations contains only one
General
Star
Mesh
Ring
Q.20
Who are the people that actually use the system to perform or support the work to be completed?
System analysts
System designers
System owners
None of the above
Q.21
Google are using information technology to pursue this generic strategy of ____________.
Low-cost leadership
Product differentiation
Focus on market niche
Strengthening customer and supplier intimacy
Q.22
________ system uses the condition concept for processing.
Object based
Rule based
Frame based
Case based
Q.23
_________ is the period in days between the ordering and delivering of goods.
Demand
Duration
Lead time
Process
Q.24
Which of the following is Electronic Conference Tool(s)?
Chat System
Video Conferencing
Discussion Forum
All the above
Q.25
In network the different communication are interconnected by using a communication processors called a _____.
Protocols
Gateway
Multiplexers
Router
Q.26
E-commerce is ubiquitous it reduces __________.
Marketspace
Transaction costs
Dynamic pricing
Price discrimination
Q.27
In network the term protocols means ____.
Procedures
Conditions
Algorithms
Rules and regulations
Q.28
Which is not a typical business function?
Sales
Service
Manufacturing
Benefits and Compensation
Q.29
FIFO stands for ______.
First Interactive First Out
First In First Out
First Invented First Out
First Interface First Out
Q.30
Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________.
Phishing
Pharming
Evil twin
Spamming
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page