MCQOPTIONS
Saved Bookmarks
This section includes 600 Mcqs, each offering curated multiple-choice questions to sharpen your General Management knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
________ steps ensure the success of the new systems |
| A. | nitial |
| B. | mplementation |
| C. | esting |
| D. | esign |
| Answer» C. esting | |
| 202. |
______ type of feasibility deals with the costs of both development and operations of the system. |
| A. | conomic |
| B. | otivational |
| C. | echnical |
| D. | chedule |
| Answer» B. otivational | |
| 203. |
_____ duplex transmission can flow data in two ways but one direction at a time. |
| A. | ull |
| B. | witch |
| C. | alf |
| D. | ircuit |
| Answer» D. ircuit | |
| 204. |
Which of the following consists of all the hardware and software that a firm needs to achieve its business objectives? |
| A. | atabase technology |
| B. | etworking technology |
| C. | torage technology |
| D. | nformation technology |
| Answer» E. | |
| 205. |
Medium bans channels use ____ type of cables used for transmissions. |
| A. | hielded twisted pair |
| B. | nshielded twisted pair |
| C. | ibre optics |
| D. | o-axial |
| Answer» B. nshielded twisted pair | |
| 206. |
Which type of system tracks day-to-day activities of an organization? |
| A. | ransaction processing system (TPS) |
| B. | anagement information system (MIS) |
| C. | ecision-support system (DSS) |
| D. | xecutive support system (ESS) |
| Answer» B. anagement information system (MIS) | |
| 207. |
_______is (are) the important component(s) of DSS. |
| A. | ialogue Management |
| B. | odel Management |
| C. | odel Management |
| D. | ll the above |
| Answer» E. | |
| 208. |
The system is an orderly grouping of various components linked together to reach ______. |
| A. | profit state |
| B. | specific objective |
| C. | anagers objective |
| D. | arget |
| Answer» C. anagers objective | |
| 209. |
Where, when and how to apply knowledge is referred as __________________. |
| A. | isdom |
| B. | nformation |
| C. | ata |
| D. | nowledge |
| Answer» B. nformation | |
| 210. |
In network while transferring the data, whole is divided in to _____. |
| A. | ackets |
| B. | locks |
| C. | mall units |
| D. | ata |
| Answer» B. locks | |
| 211. |
Determining whether reliable hardware and software required by a proposed system is available or can be acquired by the computer using organization is called___________. |
| A. | ost/benefit analysis |
| B. | conomic feasibility |
| C. | perational feasibility |
| D. | echnical feasibility |
| Answer» E. | |
| 212. |
_____ is a device that makes pen and ink drawings of lines, curves and shapes. |
| A. | ight pen |
| B. | ouse |
| C. | eyboard |
| D. | lotters |
| Answer» E. | |
| 213. |
ESS and GDSS are mostly used by ____________. |
| A. | enior Executive |
| B. | iddle Managers |
| C. | perational Managers |
| D. | ata Workers |
| Answer» B. iddle Managers | |
| 214. |
_______ is small figures that look like a file folder appears in the screen. |
| A. | older |
| B. | cons |
| C. | ile |
| D. | ursor |
| Answer» C. ile | |
| 215. |
In database, table is made of _______. |
| A. | ields and records |
| B. | ata and information |
| C. | ell and borders |
| D. | ext and images |
| Answer» B. ata and information | |
| 216. |
Prototyping replaces unplanned work with _______________. |
| A. | nd-user practices |
| B. | ystem analysis |
| C. | ard-copy analysis |
| D. | lanned iteration |
| Answer» E. | |
| 217. |
Data encryption concept is used for ______ purposes. |
| A. | ata hidden |
| B. | ata display |
| C. | ata processing |
| D. | ata transfer |
| Answer» E. | |
| 218. |
Developing Products, Services, or Process that give a Company a Superior Business Position is termed as _________________. |
| A. | onopoly |
| B. | op Performance |
| C. | roductivity |
| D. | ompetitive Advantage |
| Answer» E. | |
| 219. |
In communication ______ controls the input and output activities |
| A. | oftware |
| B. | ardware |
| C. | ignals |
| D. | ata |
| Answer» B. ardware | |
| 220. |
A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process is _______________. |
| A. | ystem initiation |
| B. | ystem implementation |
| C. | ystem analysis |
| D. | ystem design |
| Answer» E. | |
| 221. |
The ______ is monitors the activities of the computer system |
| A. | rocessor |
| B. | AM |
| C. | OM |
| D. | perating system |
| Answer» E. | |
| 222. |
The person who ensures that systems are developed on time, within budget, and with acceptable quality is a __________________. |
| A. | ystem designer |
| B. | roject manager |
| C. | ystems owner |
| D. | xternal system user |
| Answer» C. ystems owner | |
| 223. |
_____ software describes the programs that are written for users system. |
| A. | ystem |
| B. | pplication |
| C. | eneralized |
| D. | pecific |
| Answer» C. eneralized | |
| 224. |
The system software are also called _______. |
| A. | ackage |
| B. | ystem Software |
| C. | tilities |
| D. | pplication Software |
| Answer» C. tilities | |
| 225. |
Which one of the following is not one of the major dimensions for developing international information systems architecture?. |
| A. | orporate global strategies |
| B. | rganization structure |
| C. | anagement and business processes |
| D. | usiness process reengineering |
| Answer» E. | |
| 226. |
GUI stands for _______ |
| A. | raphical User Interface |
| B. | raphical User Interactive |
| C. | raphical User Integration |
| D. | raphical User Inference |
| Answer» B. raphical User Interactive | |
| 227. |
Restructuring & transforming a business process by a rethinking and redesign done by ____________. |
| A. | IS |
| B. | nd-Users |
| C. | PR Process |
| D. | educed rate of growth in expenses |
| Answer» D. educed rate of growth in expenses | |
| 228. |
A decision support system, which provides support for decision making by a group of persons is __________. |
| A. | SSB |
| B. | he firm's existing MIS |
| C. | DSS |
| D. | ardware components |
| Answer» D. ardware components | |
| 229. |
In the Financial Decision-Making System which of the following is not a transaction processing system input _____________. |
| A. | ash receipts |
| B. | ash returns |
| C. | ash issues |
| D. | arehouse requisition slip |
| Answer» E. | |
| 230. |
Assembly language use _______ technology for programming |
| A. | ymbols |
| B. | ata |
| C. | nemonic codes |
| D. | lpha numeric |
| Answer» D. lpha numeric | |
| 231. |
Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks best describes a(n) ______________. |
| A. | ntruder detection system |
| B. | irewall |
| C. | yber checkpoint |
| D. | yberwall |
| Answer» C. yber checkpoint | |
| 232. |
Google are using information technology to pursue this generic strategy of ____________. |
| A. | ow-cost leadership |
| B. | roduct differentiation |
| C. | ocus on market niche |
| D. | trengthening customer and supplier intimacy |
| Answer» C. ocus on market niche | |
| 233. |
The ________ has no pre-established decision procedures. |
| A. | nstructured |
| B. | tructured |
| C. | tandard |
| D. | table |
| Answer» B. tructured | |
| 234. |
In very big network the ______device is used to find the effective part in time. |
| A. | outer |
| B. | odem |
| C. | ontrol |
| D. | ub |
| Answer» B. odem | |
| 235. |
Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________. |
| A. | hishing |
| B. | harming |
| C. | vil twin |
| D. | pamming |
| Answer» B. harming | |
| 236. |
________ system uses the condition concept for processing. |
| A. | bject based |
| B. | ule based |
| C. | rame based |
| D. | ase based |
| Answer» D. ase based | |
| 237. |
Common threats against information systems come from all of the following factors except ___________________. |
| A. | echnical |
| B. | rganizational |
| C. | overnmental |
| D. | nvironmental |
| Answer» D. nvironmental | |
| 238. |
_________ will produce the periodic financial statements and reports of the business. |
| A. | ash ledger |
| B. | inal Account |
| C. | rail Balance |
| D. | eneral Ledger |
| Answer» E. | |
| 239. |
The main characteristics of Knowledge Process Outsourcing are___________. |
| A. | rocess are not easily codified |
| B. | he agent has to interpret the information |
| C. | he agent is expected to exercise judgement |
| D. | ll of the above |
| Answer» E. | |
| 240. |
________ keeps tracks of data concerning purchase from and payments to suppliers. |
| A. | nventory control |
| B. | ccounts payable |
| C. | ayroll |
| D. | ccounts receivable |
| Answer» C. ayroll | |
| 241. |
The MIS should be developed by____________. |
| A. | he manager |
| B. | he information specialist |
| C. | oth (a) and (b) |
| D. | either (a) or (b) |
| Answer» D. either (a) or (b) | |
| 242. |
A network of organizations used for procuring raw materials, transforming these materials into products, and distributing the products to customers is called _____________________. |
| A. | alue chain |
| B. | upply chain |
| C. | nterprise system |
| D. | rocess chain |
| Answer» C. nterprise system | |
| 243. |
______ type of cables need minimum numbers of repeaters |
| A. | ibre optic |
| B. | o-axial |
| C. | wisted pair |
| D. | ead wire |
| Answer» B. o-axial | |
| 244. |
This type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender is _________________. |
| A. | igital signature |
| B. | ymmetric key encryption |
| C. | ublic key encryption |
| D. | igital certificate |
| Answer» B. ymmetric key encryption | |
| 245. |
_______ type of cables uses the copper wire for data transmission |
| A. | ibre optics |
| B. | o-axial |
| C. | ead wire |
| D. | wisted pair |
| Answer» E. | |
| 246. |
In networks can be classified by their shape are called _____. |
| A. | opology |
| B. | tructure |
| C. | lans |
| D. | rchitecture |
| Answer» B. tructure | |
| 247. |
E-commerce is ubiquitous it reduces __________. |
| A. | arketspace |
| B. | ransaction costs |
| C. | ynamic pricing |
| D. | rice discrimination |
| Answer» C. ynamic pricing | |
| 248. |
In network the different communication are interconnected by using a communication processors called a _____. |
| A. | rotocols |
| B. | ateway |
| C. | ultiplexers |
| D. | outer |
| Answer» C. ultiplexers | |
| 249. |
A method of interacting with customers such as a Web site or a wireless device is called _____________. |
| A. | emand point |
| B. | ustomer service model |
| C. | ales force point |
| D. | ouch point |
| Answer» E. | |
| 250. |
In network the term protocols means ____. |
| A. | rocedures |
| B. | onditions |
| C. | lgorithms |
| D. | ules and regulations |
| Answer» E. | |