Information Systems for Managers NMIMS MCQ set 7

Q1: What output shows design stage

a. Document that clearly outlines the scope of the project, the budget, the personnel involved, the likely milestones and the key success indicators.

b. Detailed requirement document that specifies the objective of the system and what is needed to be done to realize these objectives.

c. Document that specifies the system in great details but does not necessarily contain coded programs.

d. None of the above

Answer

c. Document that specifies the system in great details but does not necessarily contain coded programs.

Q2: Which are the key elements of IOT

a. Containers and sensors

b. Actuators and containers

c. Sensors and actuators

d. None of these

Answer

c. Sensors and actuators

Q3. Advertising can build —–, but brands are built through —–.

a. product value; pricing strategies

b. recognition; viral campaigns

c. awareness; customer experience

d. customer loyalty; funding

d. image; television promotion

Answer

awareness; customer experience

Q4: CRM systems are used widely to maintain details about customers like their

a. interactions with the organization

b. purchasing and payment details

c. service needs and other similar details

d. all of the above

Answer

all of the above

Q5: What is followed by the formal steps of testing and implementation.

a. Analysis

b. Maintenance

c. Coding

d. Implementation

Answer

c. Coding

Q6. The phenomenon whereby firms can make money by selling a near-limitless selection of less popular products is known as —–.

a. economies of scale

b. the long tail

c. the grey market

d. economies of scope

d. the product lifecycle

Answer

the long tail

Q7. Firms enjoy —– when they are able to leverage the cost of an investment across increasing units of production.

a. economies of scope

b. absolute advantage

c. complementary benefits

d. scale economies

d. high stock market valuations

Answer

scale economies

Q8. Which term refers to a classification of software that monitors trends among customers and uses this data to personalize an individual customer’s experience?

a. Cloud computing

b. Data warehousing

c. The long tail

d. Collaborative filtering

d. Crowdsourcing

Answer

Collaborative filtering

Q9. When firms find themselves in situations where they are both competitors and partners, the situation is called —–.

a. collaborative filtering

b. strategic balancing

c. crowdsourcing

d. coopetition

d. straddling

Answer

coopetition

Q10. An industry practice whereby content is available to a given distribution channel for a specified time period, usually under a different revenue model is known as —–.

a. hoarding

b. pre-empting

c. stalling

d. scheduling

d. windowing

Answer

windowing

Q11. Removing an organization from a firm’s distribution channel thereby collapsing the path between supplier and customer is known as —–.

a. digital distribution

b. disintermediation

c. outsourcing

d. privatization

d. expulsion

Answer

disintermediation

Q12. —– refer(s) to a limit imposed by the Internet service provider on the total amount of traffic that a given subscriber can consume.

a. spectrum

b. long tail

c. bandwidth caps

d. price ceilings

d. cloudbursting

Answer

bandwidth caps

Q13. —– has allowed Amazon to radically drop the price of Kindle offerings, while increasing device functionality.

a. Network Effects

b. Moore’s Law

c. Publisher subsidies

d. Metcalfe’s Law

d. Robotics-driven inventory turns

Answer

Moore’s Law

Q14. Storing digital goods in the cloud via a firm-controlled standard means a company will create the competitive asset of —–.

a. low-cost

b. switching costs

c. brand

d. scale

d. marginal cost

Answer

switching costs

Q15. The —– defines the rules for communication between Web browsers and Web servers.

a. internet message access protocol

b. session initiation protocol

c. hypertext transfer protocol

d. simple mail transfer protocol

d. file transfer protocol

Answer

hypertext transfer protocol

Q16. Mistyping path or filenames in a Web address may result in a 404 error, which means:

a. incorrect case.

b. document not found.

c. unrecognized command.

d. access denied.

d. bad command or filename.

Answer

document not found

Q17. The —– is a distributed database that looks up the host and domain names that a user enters, and returns the actual IP address for the computer that the user wants to communicate with.

a. Web hosting service

b. cache

c. domain name service

d. uniform resource locator

d. network address translation

Answer

domain name service

Q18. The temporary storage space used to speed up computing tasks like accessing Web sites is called a:

a. recall.

b. buffer.

c. cache.

d. backup.

d. reserve.

Answer

cache

Q19. The —– protocol works at both the start and endpoint of an Internet communication between two computers to ensure perfect copies of messages are sent and received.

a. -transmission control

b. internet message access

c. simple mail transfer

d. internet message control

d. file transfer

Answer

transmission control

Q20. A(n)—– refers to a unit of data forwarded by a network.

a. cache

b. protocol

c. router

d. clip

d. packet

Answer

packet

Q21. The relaying of data packets between the two ends of a communication over the Internet is carried out through special computers called:

a. messengers.

b. servers.

c. exchanges.

d. routers.

d. relays.

Answer

routers

Q22. When different ISPs connect their networking equipment together to share traffic, it is called:

a. load balancing.

b. caching.

c. peering.

d. traffic diffusion.

d. optimizing.

Answer

peering

Q23. High-speed last-mile technologies are usually referred to as:

a. high fidelity.

b. supraband.

c. broadband.

d. hyper-speed.

d. hyper-band.

Answer

broadband

Q24. Wireless systems provided by earth-bound base stations like cell phone towers are referred to as:

a. middle earth wireless.

b. high-fidelity wireless.

c. satellite wireless.

d. terrestrial wireless.

d. geostationary wireless.

Answer

terrestrial wireless.

Q25. One possible solution that can provide improved wireless performance when a home otherwise suffers from poor cellular connectivity is:

a. FTTH

b. femtocell technology

c. DSL (but only in dense urban areas)

d. cable-fiber hybrids, but with one connection to each home.

d. HFT

Answer

femtocell technology

Q26. GitHub and StackOverflow are websites that are especially useful for students and professionals focusing on the —– industries

a. Airline

b. Software development

c. Political science

d. Journalism and publishing

d. Photography

Answer

Software development

Q27. ____ includes social media sites and open source software and involves the participation of users to provide the infrastructure and computational resources that enable a service.

a. Coopetition

b. Collaborative filtering

c. Disintermediation

d. Peer production

d. User aggregation

Answer

peer production

Q28. The phrase —– refers to efforts where participants share access to products and services rather than having ownership.

a. Collaborative consumption

b. Journalism and publishing

c. Political science

d. Software development

d. Photography

Answer

Collaborative consumption

Q29. A Web site anyone can edit directly within a Web browser is known as a —–.

a. cloud site

b. microblog

c. blog

d. torrent

d. wiki

Answer

wiki

Q30. Which of the following is an example of a web service that enables crowdsourcing.

a. All of the above

b. Amazon’s Mechanical Turk

c. None of the above

d. Innocentive

d. TopCoder

Answer

Innocentive

Q31. —– refers to a false online persona created to promote a particular point of view often in praise of a firm, product, or individual.

a. Mirage

b. Image illusion

c. Astroturfing

d. Sock puppet

d. Deceit post

Answer

sock puppet

Q32. Engineering the posting of positive comments and reviews of a firm’s product and services on feedback forums is known as —–.

a. sensationalism

b. lobbying

c. framing

d. censoring

d. astroturfing

Answer

astroturfing

Q33. —– refer to protesters seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.

a. Script kiddies

b. Trolls

c. Fraudsters

d. Hacktivists

d. Phishers

Answer

Hacktivists

Q34. Exploits that attempt to infiltrate a computer system by masquerading as something that they are not are called:

a. Trojans.

b. viruses.

c. adware.

d. worms.

d. botnets.

Answer

trojans

Q35. The —– framework represents a series of standards for best practices in implementing, maintaining and improving organizational security.

a. Snowden

b. UN Encryption Mandate

c. ISO 27000

d. Carbonite

d. OpenSSL

Answer

ISO 27000

Q36. A security tool that is deployed by firms as a phony target to lure or distract attackers and gain information about them is known as a:

a. firewall.

b. honeypot.

c. blacklist.

d. security bait.

d. red herring.

Answer

honeypot

Q37. Programs that use —– are highly restrictive, permitting communication only with pre-approved entities.

a. Certificate authorities

b. Blacklists

c. Whitelists

d. Firewalls

d. Safelists

Answer

Whitelists

Q38. Malware —– are a sort of electronic fingerprint often used to recognize malicious code.

a. code patterns

b. code trails

c. impressions

d. signatures

d. digital tags

Answer

signatures

Q39. —– is the process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote.

a. Phishing

b. Click scam

c. Link fraud

d. SQL injection

d. DNS cache poisoning

Answer

Link fraud

Q40. The term —– refers to Internet content that cannot be indexed by Google and other search engines.

a. lock-in

b. spam

c. dark Web

d. link fraud

d. walled garden

Answer

dark Web

Q41. Ads that run before a user arrives at a Web site’s contents are called —–.

a. third-party cookies

b. landing pages

c. banner ads

d. intermediary ads

d. interstitials

Answer

interstitials

Q42. —– is a nonprofit industry trade group for the interactive advertising industry.

a. Internet Revenue Service

b. Internet Advertising Bureau

c. Interactive Advertising Council

d. Board of Advertising Standards

d. Advertising Bureau of Circulations

Answer

Internet Advertising Bureau

Q43. A Sheetfed scanner is held and dragged over a document to scan it.

a. True

b. False

Answer

b. False

View another MCQs Set of Information Systems for Managers

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.