MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Management
Management Information System (MIS)
Quiz 6
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Q.1
In punched card system, holes are punched by device are called ______.
Hole
Key stroke
Key punch
Scanning
Q.2
Finger print system of security control comes under ______.
Procedural
Biometric
Hardware
Facility
Q.3
The _____ organization often constructs its own messages.
formal
informal
stable
unstable
Q.4
______________ is unauthorized copying of software.
Software Piracy
Trojan Horse
Trojan Horse
Packet Sniffer
Q.5
A _______ evaluation process reduces the possibility of buying inadequate hardware.
Stable
Formal
Unstable
Informal
Q.6
__________ charts are used to represent the project tasks and durations.
Gantt
X ray
Bar
Scatter
Q.7
The project team is composed of the system professional are directly responsible for _____ the system
testing
building
deleting
innovating
Q.8
PDA means ______.
Pocket Data Assistants
Personal Data Assistants
Pocket Digital Assistants
Personal Digital Assistants
Q.9
In _____ organization, authority is delegated down the hierarchy.
traditional
classical
operational
absolute
Q.10
The emerging class of applications focuses on personalized decision support, modeling, information retrieval, data warehousing, what-if scenarios and reporting is called __________________.
Decision Support Trends
Decision Support History
Decision Support models
Decision Support class
Q.11
A _____ types of processor design uses a group of instruction processors to execute program at the same time.
Coupled
Multilevel
Parallel
Single
Q.12
_____ leader who commands both positional and personal influence.
Team
Project
Formal
Informal
Q.13
RFP stands for ______.
Request for Proposal
Request for Process
Request for Product
Request for Prediction
Q.14
Decision support system involves all of the following types of analytical modeling activities except?
What-if analysis
Sensitivity analysis
Goal-seeking analysis
Heuristics
Q.15
Program testing concept use ________ approaches
Sequence
Parallel
top-down
bottom-up
Q.16
_________________ is an area of philosophy concerned with developing ethical principles and promoting ethical behavior and practices in the accomplishment of business tasks and decision making.
Business Ethics
Behavioral stage
Ethical values
Equity
Q.17
__________ type of budgeting is based on estimation of total project cost by the top management.
top-down
bottom-up
neural
zero-based
Q.18
______ type of feasibility deals with the costs of both development and operations of the system.
Economic
Motivational
Technical
Schedule
Q.19
________ steps ensure the success of the new systems
Initial
Implementation
Testing
Design
Q.20
TPS stands for_____
Transaction Processing System
Transaction Process System
Transaction Product System
Transaction Profit System
Q.21
____ sub system deals with activities as purchasing, receiving inventory control and distribution
Marketing
Purchase
Sales
Logistics
Q.22
GB in memory stands for _____.
Giga Bytes
Giga Bits
Gif Bits
Gif Bytes
Q.23
______________________ decision support system that provides support for decision making by groups of people
Group Decision Support System (GDSS)
Decision Support System (DSS)
Groupware Software
Graphics Software
Q.24
Which one of the following is used for evaluating credit risks?
Virtual Reality
Neural Network
Fuzzy logic
None of the above
Q.25
________________ is a program code that cannot work without being inserted into another program.
Worm
Virus
Sniffer
Spoofing
Q.26
_______ takes responsibility and keeps track of progress in MIS design. Development and implementation.
Time remainder
Periods
Allocation
Scheduling
Q.27
________________ is obsessive use of a computer or unauthorized access and use of computer systems.
Hacking
Computer Crime
Trojan Horse
Packet Sniffer
Q.28
In which of the following types of analysis, the value of only one variable is changed repeatedly, and the resulting changes on other variables are observed.
what if analysis
sensitivity analysis
Goal seeking analysis
None of these
Q.29
________ type of testing ensures the system is free of errors and is ready to be placed into operation.
Audit
General
Technical
Data
Q.30
_________________ is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or the entire contents.
Hacking
Computer Crime
Trojan Horse
Packet Sniffer
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page