(Autonomous, affiliated to the Bharathiar University, recognized by the UGC)Re- accredited at the 'A' Grade Level by the NAAC and ISO 9001:2008 Certified CRISL rated 'A' (TN) for MBA and MIB Programmes I MBA[2013-2016 PT] SEMESTER II CORE:MANAGEMENT INFORMATION SYSTEM - 252A Multiple Choice Questions. 1. Which type of system tracks day-to-day activities of an organization? A. Transaction processing system (TPS). B. Management information system (MIS). C. Decision-support system (DSS). D. Executive support system (ESS). ANSWER: A 2. Which type of system produces reports on a regular schedule in a predetermined format? A. Transaction processing system. B. Management Information System. C. Decision-support system. D. Executive support system. ANSWER: B 3. Which type of system is most often used for analyzing semi structured problems? A. Transaction processing system. B. Management information system. C. Decision Support System. D. Executive support system. ANSWER: C 4. These systems address non-routine decisions requiring judgment, evaluation, and insight because there is no agreed-on procedure for arriving at a solution. A. Enterprise system. B. Supply chain management (SCM) system. C. Executive support systems. D. Knowledge management system (KMS). ANSWER: C 5. Systems that span all functional areas and focus on executing business processes across the firm are called. A. Business functional systems. B. Enterprise applications C. Transaction processing systems. D. Data management systems. ANSWER: B 6. Which system stores all organizational data in a single central data repository? A. Management information system. B. Customer relationship system. C. Enterprise system. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 1 of 21 1/29/2014 2:28 PM D. Transaction processing system. ANSWER: C 7. Which of the following would not describe how a firm can benefit from Supply Chain Management systems? A. Rapidly communicate changes in product design. B. Check inventory availability and monitor inventory levels. C. Control the actions of machines and equipment. D. Plan production based on actual customer demand. ANSWER: C 8. Which type of enterprise application is specifically used to help a business to increase sales? A. Enterprise system B. Supply chain management (SCM) system. C. Customer Relationship Management (CRM) system. D. Knowledge management system (KMS). ANSWER: C 9. Which type of enterprise application stores directories of employees with special areas of expertise? A. Enterprise system B. Supply chain management system C. Customer relationship management system. D. Knowledge Management System. ANSWER: D 10. 12. This term refers to the use of digital technology and the Internet to execute the major business processes in an enterprise A. Electronic Business. B. Electronic markets. C. Electronic data interchange D. Electronic management. ANSWER: A 11. . Which person is responsible for the overall use of information technology in a large conglomerate?. A. System Analyst B. Chief Executive Officer (CEO). C. Chief Information Officer (CIO). D. Chief Management Officer (CMO). ANSWER: C 12. Data about the performance of a system is A. Marketing Data B. Control C. Meta Data D. Feed Back ANSWER: D 13. Structured decisions are ___________ in nature A. Non-Repetitive B. Repetitive C. Routine D. Both (b) & (c) ANSWER: D http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 2 of 21 1/29/2014 2:28 PM 14. Which of the following consists of all the hardware and software that a firm needs to achieve its business objectives?. A. Database technology. B. Networking technology. C. Storage technology. D. Information technology. ANSWER: D 15. Data shaped into meaningful form are called. A. A databank. B. Feedback C. Knowledge. D. Information. ANSWER: D 16. Raw facts that have not been organized into a useful form are called. a. Information. A. Business objectives. B. Information. C. Data D. Information systems. ANSWER: C 17. Which activity of an Information System converts raw input into a meaningful form?. A. Input. B. Processing. C. Output. D. Feedback. ANSWER: B 18. Electronic Retailing of Products & Services directly to individual consumers in A. B2B B. B2C C. C2C D. None ANSWER: B 19. The world's largest and most widely used network is the A. LAN . B. Intranet. C. Extranet. D. Internet. ANSWER: D 20. The linkage of two or more computers together to share data or resources is called a A. System. B. Network. C. Protocol. D. Information technology infrastructure. ANSWER: B 21. The shifting of intermediary role in a value chain to a new source is called as A. Intermediation B. Disintermediation C. Re-intermediation http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 3 of 21 1/29/2014 2:28 PM D. None ANSWER: C 22. All organizations become very efficient over time because individuals in the firm develop A. Routines for producing goods and services B. Long lasting friendships within the firm. C. Better-educated employee groupings. D. Deep rooted cultures. ANSWER: A 23. This individual is credited with the development of the five forces competitive model: A. Henry Fayol. B. Max Weber. C. Michael Porter. D. Michael Dell. ANSWER: C 24. Google are using information technology to pursue this generic strategy A. Low-cost leadership. B. Product differentiation. C. Focus on market niche. D. Strengthening customer and supplier intimacy. ANSWER: B 25. Locking in customers by making it difficult for them to change to another product is referred to as. A. Creating switching costs. B. Creating up-selling costs. C. Creating adoption costs. D. Creating seek time costs. ANSWER: A 26. Another term used to describe loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers is:. A. Value We B. Business ecosystem. C. Network economics. D. Systems integration. ANSWER: B 27. The confusion created by data redundancy makes it difficult for companies to A. Create online processing capabilities. B. Work in batch processing C. Use a distributed database D. Integrate data from different sources. ANSWER: D 28. Data redundancy occurs when:. A. Multiple reports are accessed simultaneously B. The programs that access the data are change C. Different users enter information D. Fields in many different files contain the same information ANSWER: D 29. The data dictionary is the automated or manual file that:. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 4 of 21 1/29/2014 2:28 PM A. Stores information about data elements and data characteristics B. Allows the creation of supplementary reports C. Presents the data as they would be perceived by end users D. Is used in conjunction with conventional third- or fourth-generation programming languages. ANSWER: A 30. The most prominent data manipulation language today is:. A. Pascal. B. COBOL. C. SQL D. OLAP. ANSWER: C 31. This database model uses a series of logically related two-dimensional tables or files to store information:. A. Relational database. B. Hierarchical database. C. Network database D. Object-oriented database. ANSWER: A 32. This database model is well suited to handle graphics-based or multimedia applications:. A. Hierarchical DBMS. B. Network DBMS C. Relational DBMS. D. Object-oriented DBMS. ANSWER: D 33. In a DBMS, the capability to specify the structure of the content of the database is referred to as. A. Data definition B. Recursive data C. Data dictionary D. Data orientation. ANSWER: A 34. A database that is stored in more than one physical location is called a(n) A. Relational database B. Data warehouse C. Normalized database D. Distributed database. ANSWER: D 35. The power to define information requirements for the entire company is a function of:. A. Data planning and modeling B. Database administration C. Database technology D. The database management system ANSWER: B 36. The formal set of rules that govern the way in which computers communicate are called. A. Protocols B. Algorithms C. Standards. D. Procedures. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 5 of 21 1/29/2014 2:28 PM ANSWER: A 37. A network that covers a large geographic area is most commonly referred to as a(n). A. Wide area network. B. Local area network. C. Intranet. D. Inter network. ANSWER: A 38. A communications medium where data are transformed into pulses of light would be. A. Twisted-pair cable. B. A satellite C. Coaxial cable. D. Optical fiber ANSWER: D 39. The greater the bandwidth, the greater the:. A. Signal change B. Geographic scope. C. Analog D. Channel's transmission capacity ANSWER: D 40. A network inside an organization that supports communications and business functions is called a(n). A. Intranet. B. Extranet. C. Virtual private network D. Internet. ANSWER: A 41. Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks best describes a(n):. A. Intruder detection system B. Firewall. C. Cyber checkpoint D. Cyberwall. ANSWER: B 42. Common threats against information systems come from all of the following factors except. A. Technical. B. Organizational. C. Governmental. D. Environmental. ANSWER: C 43. Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called. A. Phishing. B. Pharming. C. Evil twin. D. Spamming. ANSWER: A http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 6 of 21 1/29/2014 2:28 PM 44. The single greatest cause of network security breaches is. A. Poor system patch management B. Pharming. C. Users' lack of knowledge. D. Absence of security programs. ANSWER: C 45. This process is used to examine the firm's overall security environment as well as controls governing individual information systems. A. Authentication. B. MIS audit. C. Business continuity plan. D. Security policy. ANSWER: B 46. Security systems based on physical or behavioral traits are called. A. Smart cards. B. Tokens. C. Firewalls. D. Biometrics. ANSWER: D 47. The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver is called. A. Demodulation. B. Filtering. C. Encryption. D. Stateful inspection. ANSWER: C 48. This type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender A. Digital signature B. Symmetric key encryption. C. Public key encryption. D. Digital certificate. ANSWER: A 49. A network of organizations used for procuring raw materials, transforming these materials into products, and distributing the products to customers is called a(n). A. Value chain. B. Supply chain. C. Enterprise system. D. Process chain. ANSWER: B 50. A supply strategy in which components arrive exactly at the moment they are needed is called. A. Bullwhip effect. B. Demand planning. C. Just-in-time. D. Pull-based model. ANSWER: C 51. Which of the following enable a firm to generate demand forecasts for a product?. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 7 of 21 1/29/2014 2:28 PM A. Supply chain planning systems B. Supply chain execution systems. C. Pull-based planning systems. D. Push-based planning systems. ANSWER: B 52. These systems manage the flow of products through distribution centers and warehouses to ensure that the products are delivered to the right locations in the most efficient manner. A. Supply chain planning systems. B. Supply chain execution systems. C. Pull-based planning systems. D. Push-based planning systems. ANSWER: B 53. A method of interacting with customers such as a Web site or a wireless device is called a A. Demand point B. Customer service model C. Sales force point. D. Touch point. ANSWER: D 54. A comprehensive customer relationship management package includes a module for. A. Supply chain execution system. B. Supply chain planning system. C. Partner relationship management (PRM) system D. Business forecast planning system. ANSWER: C 55. All of the following are vendors of customer relationship management software except. A. Siebel. B. Clarify. C. Sales force. D. Microsoft. ANSWER: D 56. In a CRM system, this module provides information and tools to increase the efficiency of call centers, help desks, and customer support staff. A. Customer service. B. Sales force automation. C. Demand planning. D. Employee relationship. ANSWER: A 57. Marketing complementary products to customers is called. A. Bundling. B. Cross-selling. C. Up-selling. D. Forecasting. ANSWER: B 58. This type of CRM application deals with the analysis of customer data to provide information for improving business performance. A. Operational. B. Analytical. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 8 of 21 1/29/2014 2:28 PM C. Cross selling. D. Build-to-order. ANSWER: B 59. An important indicator of the growth or decline of a firm's customer base is the. A. Customer lifetime value measurement. B. Switching cost. C. Customer acquisition cost. D. Churn rate. ANSWER: D 60. Because e-commerce is ubiquitous it reduces. A. Marketspace. B. Transaction costs. C. Dynamic pricing. D. Price discrimination. ANSWER: B 61. Changing the delivered product or service based on a user's preferences or prior behavior on the Internet is called. A. Information richness. B. Information density. C. Personalization. D. Customization. ANSWER: D 62. Removing the middleman and selling directly to a consumer in a digital marketplace is called. A. Ubiquity. B. Disintermediation. C. Reintermediation. D. Marketspace. ANSWER: B 63. Single, digital marketplaces based on Internet technology for many different buyers to many sellers are called. A. Electronic data interchanges. B. Biosphere. C. Call centers. D. Net marketplaces. ANSWER: D 64. Web sites specifically designed for m-commerce are called. A. Wireless portals. B. Online syndicators. C. Private exchanges. D. B2C e-commerce sites. ANSWER: A 65. Paypal is a perfect example of. A. Digital checking accounts. B. Stored value payment systems. C. Peer-to-peer payment systems. D. Electronic billing presentation systems. ANSWER: C http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 9 of 21 1/29/2014 2:28 PM 66. Where, when, and how to apply knowledge is referred to as:. A. Wisdom B. Information. C. Data . D. Knowledge. ANSWER: A 67. Knowledge that resides in the minds of employees that has been documented is called:. A. Corporate culture. B. Organizational memory. C. Standard operating procedures D. Tacit knowledge. ANSWER: D 68. A formal document would be classified as A. Data B. Unstructured knowledge. C. Structured knowledge. D. Semistructured knowledge. ANSWER: C 69. CAD systems require A. Processing nodes B. Neural networks C. Graphics and powerful modeling capabilities D. Groupware ANSWER: C 70. These types of systems are able to learn languages, accomplish physical tasks, use a perceptual apparatus, and emulate human expertise and decision making. A. Artificial intelligence. B. Fuzzy logic. C. CAD. D. Intelligent agents ANSWER: A 71. The inference engine can use either:. A. A strategy for searching the rule base in an expert system that begins with information entered by the user. B. The programming environment of an expert system C. A method of organizing expert system knowledge into chunks. D. A strategy used to search through the rule base in an expert system in one of two ways. ANSWER: D 72. A knowledge engineer is similar to a traditional ________________, but has special expertise in eliciting information and expertise from other professionals. A. Programmer. B. Systems analyst. C. Mid-lever manager. D. Computer technician ANSWER: B 73. Organizational knowledge can be captured and stored using. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 10 of 21 1/29/2014 2:28 PM A. Case-based reasoning B. Neural networks. C. User-defined techniques. D. Backward chaining. ANSWER: A 74. Hardware and software that attempts to emulate the processing patterns of the biological brain best describes A. Intelligent agents. B. Fuzzy Logic C. Neural networks. D. Case-based reasoning. ANSWER: C 75. Decisions in which the decision maker must provide judgment, evaluation, and insights into the problem definition would be characterized as A. Structure B. Semistructure . C. Unstructure D. Overt. ANSWER: C 76. A type of decision in which there may be several "right" answers and no precise way to get a right answer is A. Structured decision B. Unstructured decision C. Recurring decision D. Nonrecurring decision ANSWER: B 77. These systems provide analytical models or tools for analyzing large quantities of data for middle managers who face semistructured decision problems. A. Decision support systems B. Management information systems C. Executive support systems D. Transaction processing systems ANSWER: A 78. An abstract representation that illustrates the components or relationships of a phenomenon are called A. Data co-integration. B. Linear programming C. Model. D. Library. ANSWER: C 79. The results of "what-if" questions asked repeatedly to determine the impact of changes in one or more factors on the outcomes are called A. Data modeling B. Forecasting C. Classification clusters D. Sensitivity analysis ANSWER: D http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 11 of 21 1/29/2014 2:28 PM 80. The process of helping users see patterns and relationships in large amounts of data by presenting the data in graphical form is called A. Geographic information system B. Decision support system. C. Data visualization D. An optimization model ANSWER: C 81. Moving from a piece of summary data to lower and lower levels of detail is referred to as:. A. Drilling down. B. Sensitivity analysis C. Optimization D. Goal seeking ANSWER: A 82. GDSS can be expanded as A. Group Data Software Structure B. Group Decision Software Solutions C. Group Decision Support System D. Group Decision Software System. ANSWER: C 83. An interactive computer-based system that is used to facilitate the solution to unstructured problems by a set of decision makers working together is called a:. A. Fuzzy logic system. B. Decision support system. C. Group decision support system. D. Management information system. ANSWER: C 84. ESS and GDSS are mostly used by A. Senior Executrices B. Middle Managers C. Operational Managers D. Data Workers ANSWER: A 85. Electronic Filing, Voice Mail are the reponsibilities of A. Office Automation System. B. Transaction Processing System. C. Expert System . D. Executive Support System ANSWER: A 86. Willingness of the Management, Customers, Suppliers, Employees, the acceptance of End-Users...in related to SDLC belongs to A. Operational Feasibility B. Technical Feasibility C. Economic Feasibility D. Organisational Feasibility ANSWER: A 87. Information technology can create new design options for various processes because:. A. More tools are available http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 12 of 21 1/29/2014 2:28 PM B. Management understands information technology options C. Most employees are now computer-literate. D. It can be used to challenge standing assumptions about work arrangements. ANSWER: D 88. User training and System conversion belong to _________ phase of SDLC A. .Analysis B. Design C. Implementation. D. Maintenance. ANSWER: C 89. "Who needs what information, where, when, and how" describes the most basic description of:. A. Information requirements. B. A feasibility study. C. Total quality management. D. Systems development processes. ANSWER: A 90. In the phased approach conversion strategy, the new system A. Is tested by an outsourced company. B. Replaces the old one at an appointed time. C. Is introduced to a limited area until it is proven to work properly D. Is introduced in stages or parts ANSWER: D 91. Automation of step-by-step methodologies for software and systems development to reduce the amounts of repetitive work the develop needs to do is. A. CA . B. Object-oriented development C. CASE. D. JA ANSWER: C 92. Prototyping replaces unplanned work with:. A. End-user practices B. System analysis C. Hard-copy analysis. D. Planned iteration. ANSWER: D 93. Application service providers are a form of:. A. Information centers. B. Outsourcing. C. End-user development models D. Prototypes. ANSWER: B 94. This technique is often used to accelerate the generation of information requirements and to develop the initial systems design. A. Joint Application Development. B. Rapid Application Development C. Request for proposal. D. End user interface. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 13 of 21 1/29/2014 2:28 PM ANSWER: A 95. Both the old and new systems are operated in ___________ conversion A. Direct Cutover B. Pilot C. Parallel D. Crash approach ANSWER: C 96. Developing Products, Services, or Process that give a Company a Superior Business Position is termed as __________________ A. Monopoly. B. Top Performance C. Productivity D. Competitive Advantage ANSWER: D 97. SIS means A. Short-term Investment Strategy B. System Integrated Software C. Strategic Information System D. Society of Information System ANSWER: C 98. Restructuring & transforming a business process by a rethinking and redesign - done by A. MIS B. End-Users C. BPR Process D. Reduced rate of growth in expenses ANSWER: C 99. Organisation's rapid response to unexpected challenges is generally known as A. Real options pricing models B. Agility C. Competitive advantage D. Competitive necessity ANSWER: B 100. ___________is a form of organization that uses telecommunication networks & other Information Technology to link people, assets and ideas of variety of business partners a. Flat structure A. Flat structure B. Virtual Company C. Line and Staff D. Matrix structure ANSWER: B 101. Virtual Company is also known as A. Virtual Corporation B. Virtual Organisation C. Both a and b D. None ANSWER: C 102. Virtual Company http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 14 of 21 1/29/2014 2:28 PM A. Shares the infrastructure B. Links core competencies C. Shares risks with alliance partners D. All the above ANSWER: D 103. Communications problems between end users and designers are one reason why:. A. Users are driven out of the implementation process B. So much user training is require . C. The implementation process requires written procedures. D. Cost overruns are so large. ANSWER: A 104. This chart shows each project task as a horizontal bar whose length is proportional to the time required to complete it. A. PERT chart. B. Optimization chart. C. Gant Chart. D. Flow chart. ANSWER: C 105. Which one of the following is not one of the major dimensions for developing international information systems architecture?. A. Corporate global strategies. B. Organization structure. C. Management and business processes. D. Business process reengineering. ANSWER: D 106. The stored Data and documents are termed as __________ knowledge A. Tacit knowledge B. Explicit knowledge C. Deep knowledge D. Shallow knowledge ANSWER: B 107. ____________ knowledge can not be codified A. Tacit knowledge B. Explicit knowledge C. Deep knowledge D. Shallow knowledge ANSWER: A 108. An interconnected chain or group of systems is called as A. System Chain B. Network C. System expansion D. Link ANSWER: B 109. A challenge and obstacle to global business systems deals with political laws. Specifically it would encompasses:. A. Transborder data and privacy laws. B. Language differences http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 15 of 21 1/29/2014 2:28 PM C. Telecommunication standards. D. Shortages of skilled consultants. ANSWER: A 110. Network of networks means A. Intranet B. Internet C. Extranet D. Private network ANSWER: B 111. A Company that provide access to the Internet to individuals and organisations A. Trans border data flow B. Internet Service Provider C. Sender D. Systems Administrator ANSWER: B 112. An Internet-like network with in the organisation A. Internet B. Intranet C. Extranet D. Network ANSWER: B 113. ___________is a Network that links the selected resources of a company with it Customers, Suppliers and other Business Partners A. Intranet B. Internet C. Extranet D. Government Network ANSWER: C 114. The term "E-Business" is coined by A. Peter Drucker B. Miller S Scott C. Lou Gerstner D. James O Berien ANSWER: C 115. Which of the following is or are the enterprise applications? A. ERP B. CRM C. PRM D. All the above ANSWER: D 116. PRM means A. Plan Route Map B. Partnership Relationship Management C. Plan and Research Management D. Partners Resources Management ANSWER: B http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 16 of 21 1/29/2014 2:28 PM 117. The analysis and design of application systems are the responsibility of a _____. A. Computer Operator. B. Programmer. C. System Analyst. D. Data entry operator. ANSWER: C 118. Customer service, field service and sales entry fall on __________in enterprise application system A. Front office B. Back office C. Server architecture D. System Developer ANSWER: A 119. The DBA is. A. A computer device. B. A communication technique. C. A person. D. All of the above ANSWER: C 120. Error reports are an example of:. A. Scheduled reports. B. Demand reports. C. Exception reports. D. Predictive reports. ANSWER: C 121. TPS means A. Transaction Plan Master B. Transaction Processing System C. Transport Plan Management D. All of the above ANSWER: B 122. ECS means A. Enterprise Collaboration System B. Economical Calculation Service C. Enterprise Communication System D. Economical Communication Service ANSWER: A 123. Which of the following is Electronic Conference Tool(s)? A. Chat System B. Video Conferencing C. Discussion Forum D. All the above ANSWER: D 124. In which way is Managerial Information System (MIS) superior to electronic data processing (EDP)?. A. It is batch oriented. B. It is most cost effective. C. It provides summary reports without details. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 17 of 21 1/29/2014 2:28 PM D. None of the above. ANSWER: C 125. The vice-president of information has primary responsibility for. A. Recognizing information needs. B. Preparing an MIS study proposal. C. Setting MIS objectives. D. Establishing MIS constraints. ANSWER: B 126. Expert System contains A. Database B. Modelbase C. Knowledgebase D. All ANSWER: D 127. A central purpose of most decision-support systems is. A. To build a model of the decision making problem. B. To design a data-base management system. C. To build an additional system. D. To determine the key decisions in the problem area. ANSWER: A 128. MIS can provide A. Past information. B. Present information. C. Future information. D. All of the above. ANSWER: D 129. ______is a systematic approach to manage the entire flow of information, materials and services from raw materials, suppliers through factories and warehouses to the end customer A. Subsystem. B. ERP C. SCM D. CRM ANSWER: C 130. __________ governs the activities concerned with the planning and control of the process producing goods / services A. HRIS B. CIM C. MKIS D. FIS ANSWER: B 131. The most prominent system in the retail sales industry is the _____ system. A. POS (point-of-sale). B. COBOL. C. ACM. D. PC/XT. ANSWER: A http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 18 of 21 1/29/2014 2:28 PM 132. ___________ automate the production process A. Estimated disposal data. B. CAM C. Total Quality Management D. All of the above. ANSWER: B 133. MES means A. Manufacturing Enlargement System B. Malfunction Execution System C. Manufacturing Execution System D. Manufacturing Engineering System ANSWER: C 134. _____ provides a set of integrated computer tools that allow a decision maker to interact directly with computers in order to retrieve information useful for semistructured and unstructured decisions,. A. DBMS. B. DSS. C. MIS. D. Control. ANSWER: B 135. _______is (are) the important component(s) of DSS A. Dialogue Management B. Data Management C. Model Management D. All the above ANSWER: D 136. In the Financial Decision-Making System which of the following is not a transaction processing system input:. A. Cash receipts. B. Cash returns. C. Cash issues. D. Warehouse requisition slip. ANSWER: D 137. A decision support system, which provides support for decision making by a group of persons A. DSS B. The firm's existing MIS. C. GDSS D. Hardware components ANSWER: C 138. The MIS should be developed by. A. The manager. B. The information specialist. C. Both (a) and (b). D. Neither a or b. ANSWER: C 139. Which one of the following is not the function of MKIS? A. Interactive Marketing B. Sales Force Automation http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 19 of 21 1/29/2014 2:28 PM C. Maintenance of Payroll records D. Product Management ANSWER: C 140. The Management Information System (MIS) provides timely and effective information to support decision making and other necessary management functions. Can you point out the subsystem which does not being to the MIS?. A. Operational and Tactical System. B. Decision Support System (DSS). C. Data Communication System. D. Automated Office System. ANSWER: C 141. . An _____ system has a stored knowledge base and an inference engine. A. Expert. B. Centers. C. Control. D. MIS. ANSWER: A 142. An information system that supplies information specifically to aid managers with decision making responsibilities is called A. DBMS. B. MIS. C. OAS D. DBA. ANSWER: B 143. Which of the following best explains the meaning of managerial participation in effective computer utilization is MIS:. A. Managers operate the computer. B. Need for understanding and support from top management'. C. Managers need to be educated about computers. D. Managers need to go through the computers reports. ANSWER: B 144. Data integrity refers to. A. The simplicity of data. B. The privacy of data. C. The validity of data. D. The security of data. ANSWER: C 145. A characteristic of a distributed MIS structure is:. A. Computers supporting local DP operations. B. A multiprocessing environment. C. Integrative sharing of the workload. D. All of the above. ANSWER: C 146. These systems typically provide periodic reports rather than instant information on operations A. Strategic-level systems. B. Operational-level systems. C. Management-level systems. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 20 of 21 1/29/2014 2:28 PM D. Knowledge-management systems. ANSWER: C 147. A hotel reservation system would be classified as a(n):. A. Management-level system. B. Transaction-level system. C. Operational-level system. D. Strategic-level system. ANSWER: B 148. The major source of data for other systems are:. A. ESS. B. DSS. C. MIS. D. TPS. ANSWER: D 149. The most advanced graphics software in any system used by management is normally found in:. A. TPS. B. ESS. C. Intranets. D. Enterprise systems. ANSWER: B 150. Unlike other types of information systems, these systems are NOT designated primarily to solve specific problems A. Decision-support systems. B. Management information systems. C. Executive support systems. D. Transaction processing systems. ANSWER: C Staff Name MUTHUKRISHNAN.R. http://172.16.2.20/printqp.php?heading=I MBA[2013-2016 PT], SEM... 21 of 21 1/29/2014 2:28 PM