Information Systems for Managers NMIMS MCQ set 4

Q1. Systems maintenance is the longest and the costliest phase of the system`s life cycle.

a. True

b. False

Answer

a. True

Q2. In —–maintenance, the main aim is to keep the equipment of the system in working order without changing its functionality.

a. Disaster recovery

b. hardware

c. direction

d. None of these

Answer

b. hardware

Q3. Requirements do not change throughout the software development lifecycle.

a. True

b. False

Answer

b. False

Q4. A —– is a small computer program that extends the feature set or capabilities of another application.

a. codec

b. tag

c. third-party cookie

d. rootkit

d. plug-in

Answer

plug-in

Q5. Which of the following is the smallest visual element on a video monitor?

a. Character

b. Pixel

c. Byte

d. Bit

Answer

Pixel

Q6. What is the mean of the Booting in the system?

a. Restarting computer

b. Install the program

c. To scan

d. To turn off

Answer

a. Restarting computer

Q7. A computer is accurate, but if the result of a computation is false, what is the main reason for it?

a. Power failure

b. The computer circuits

c. Incorrect data entry

d. Distraction

Answer

c. Incorrect data entry

Q8. Which one of the following software applications would be the most appropriate for performing numerical and statistical calculations?

a. Database

b. Document processor

c. Graphics package

d. Spreadsheet

Answer

d. Spreadsheet

Q9. Which of the following languages computer understand?

a. JAVA language

b. C language

c. Binary Language

d. Object language

Answer

c. Binary Language

Q10. The continuous and steady flow of information helps an organisation to build —–, —–in business interaction.

a. components, interdependent, organised

b. product, service

c. Credibility and transparency

d. None of these

Answer

c. Credibility and transparency

Q11. Data is arranged, organised and processed.

a. True

b. False

Answer

b. False

Q12. A system can be defined as a set of —– which are —–and —–for a common purpose.

a. product, service, migration

b. components, interdependent, organised

c. process, actions, activities

d. None of these

Answer

b. components, interdependent, organised

Q13. Which of the following is not a characteristic of a system?

a. standards

b. boundaries

c. cost-effective

d. structure

Answer

c. Cost-effective

Q14. Which of the following is not a function of IS?

a. Data recovery

b. Storage

c. Processing

d. Input

Answer

a. Data recovery

Q15. A CBIS stores a huge amount of data and it automatically sorts data.

a. True

b. False

Answer

a. True

Q16. A business process is a series of steps that are performed to produce a —– or —–.

a. actions, activities

b. product, service

c. Hardware, Software

d. None of these

Answer

b. product, service

Q17. BPM concentrate on —–, —– and —–.

a. process, actions, activities

b. Hardware, Software

c. Ergonomics, radio frequency, software

d. None of these

Answer

a. process, actions, activities

Q18. MIS is used to analyse and organise unstructured data retrieved from internal resources only.

a. True

b. False

Answer

b. False

Q19. The two major components of information technology are—– and —–

a. Hardware, Software

b. Ergonomics, radio frequency

c. Bluetooth, infra-red

d. None of these

Answer

a. Hardware, Software

Q20. Which of the following type of devices control storage and retrieved information?

a. Processing

b. Input

c. Calculating

d. Output

Answer

a. Processing

Q21. QWERTZ keyboards are the most commonly used keyboards.

a. True

b. False

Answer

b. False

Q22. Name the study of methods that reduces stress on muscles?

a. Ergonomics

b. Bluetooth, infra-red, radio frequency

c. spreadsheets

d. None of these

Answer

a. Ergonomics

Q23. Wireless keyboards use different technologies, such as—–, —–, and —–, to connect to a computer.

a. Bluetooth, infra-red, radio frequency

b. wifi, msword, excel

c. photoshop, msword, excel

d. None of these

Answer

a. Bluetooth, infra-red, radio frequency

Q24. Which of the following are common forms of system attacks?

a. Virus outbreak

b. System compromise

c. Both of them

d. None of them

Answer

c. Both of them

Q25. Incident handling is a generalised term that pertains to the response to an attack, by a person or organisation.

a. True

b. False

Answer

a. True

Q26. —– refers to the distinct steps that are undertaken to bring the organisation back to its normal operation in case of any calamitous natural disaster or a national emergency

a. Disaster recovery

b. direction

c. reinterpreting, shifting

d. None of these

Answer

a. Disaster recovery

Q27: The manipulation of unsuspecting users to extract private information from them is done by

a. Political Espionage

b. Reverse Engineering

c. Social Engineering

d. None of these

Answer

c. Social Engineering

Q28: Which of the following is/ are applications of RFID

a. Managing inventory in large warehouse by tagging all items

b. Charging cars at toll plazas through RFID tagged display cards

c. For use on public transportation where RFID tagged passes allow user to travel without having to purchase ticket

d. all of the above

Answer

d. all of the above

Q29: In what the project proceeds along each stage with the ability to loop back to a previous stage if necessary.

a. Spiral Model

b. Agile Method

c. Waterfall Model

d. Scrum Method

Answer

c. Waterfall Model

Q30: The technology by which a message or data is transformed or translated into a form that is not easily readable by anyone

a. Public-key cryptography

b. Encryption

c. Firewall

d. Virtual Private Network

Answer

b. Encryption

Q31: The Second-order effects of the implementation of a new IS in an organization

a. become visible immediately

b. may become visible within a few weeks

c. may require years to become visible or measurable

d. both a and b

Answer

c. may require years to become visible or measurable

Q32: Which statement is not true about Wi-Fi routers and Bluetooth

a. Wi-Fi connection is approved by IEEE for wireless connection

b. Bluetooth is popularly used with hotspot or access points that are routers

c. Bluetooth standard offers lower data transfer rates and operates over a short distance

d. Wi-Fi routers should be in an unsecured manner, where anybody can simply lock into signal available and use the connection

Answer

b. Bluetooth is popularly used with hotspot or access points that are routers

Q33: Which of the following is not a type of malicious software that pose a threat to security of organization.

a. Phishing

b. worm

c. Virus

d. Trojan Horse

Answer

a. Phishing

Q34: The network used for sensing agriculture region for what is termed ‘precision agriculture’

a. RFD

b. Wireless sensor network

c. Both a. and b.

d. WI-FI

Answer

b. Wireless sensor network

Q35: The device rely on…………. …..of different frequencies to connect with each other to share info

a. UV Rays

b. Infrared Rays

c. Radio Waves

d. X-Rays

Answer

c. Radio Waves

Q36: Which is not true about wireless sensor network

a. Electronic device used to measure some aspect of the environment it is located in

b. Cannot measure temperature, humidity, movement etc.

c. Are used to sense some parameter and send out signal about measure value over wireless network

d. it ensure that the treatment is targeted at the specific spot when condition has been detected and not spend over the entire acreage

Answer

b. Cannot measure temperature, humidity, movement etc.

Q37: Which of the following is correct in regard to security audit

a. Helps the firm in achieving security goals

b. Risk assessment analyzed

c. It will test security weakness of the system

d. all of the above

Answer

d. all of the above

Q38: Which phase involves the building the system and writing the software

a. Coding and Testing

b. Implementation integration

c. Design

d. None of the above

Answer

a. Coding and Testing

Q39: Which of the following are true for mirroring?

a. It creates exact copy of entire data base of the organization

b. Called redundant facilities

c. Highly expensive, so they are stored at remote location called co- location facilities

d. All of above

Answer

d. All of above

Q40: What need led to the creation of Life cycle models.

a. Large contracts for programming, with millions of lines of code required a formal and structured manner.

b. Large contracts for software, with millions of lines of code required a formal and structured manner.

c. Small contracts for software, with millions of lines of code required unformal and unstructured manner.

d. Small contracts for software, with millions of lines of code required a formal and structured manner.

Answer

b. Large contracts for software, with millions of lines of code required a formal and structured manner.

View another MCQs Set of Information Systems for Managers

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.