Management Information Systems (MIS) MCQs

Management Information Systems (MIS) MCQs

Our experts have gathered these Management Information Systems (MIS) MCQs through research, and we hope that you will be able to see how much knowledge base you have for the subject of Management Information Systems (MIS) by answering these multiple-choice questions.
Get started now by scrolling down!

1: According to Simon's description - there are four stages in any decision-making process. Decision support systems are designed primarily to help monitor the ______ stage.

A.   Traditional life cycle

B.   Implementation

C.   Independence from GUI environment

D.   Heuristic

2: Which of the following is an object-oriented programming language that can deliver only the software functionality needed for a particular task - and which can run on any computer or operating system?

A.   Personal e-mail received from outside by the organization's system

B.   OSI

C.   Java

D.   Bandwidth

3: Which of the following is a commercial digital information service that exists to provide business information?

A.   Managing documentation of knowledge

B.   Java

C.   OSI

D.   Dialog

4: In most organizations - the chief information officer is given a rank equivalent to

A.   Executive support system (ESS)

B.   Scientific and workstation computing

C.   Analysis

D.   Vice president

5: In what type of processing can more than one instruction be processed at once - by breaking down a problem into smaller parts and processing them simultaneously?

A.   Implementation

B.   Parallel

C.   Supercomputer

D.   Simplified testing and documentation procedures

6: Which of the following is a shared network service technology that packages data into bundles for transmission but does not use error correction routines?

A.   Frame relay

B.   Transaction processing system (TPS)

C.   Traditional life cycle

D.   Data bus width

7: Which of the following steps in the business systems planning (BSP) process is typically performed FIRST?

A.   Asynchronous transfer mode (ATM)

B.   Using serif typefaces in graph labels

C.   Gateway

D.   Defining business processes

8: Which of the following systems exists at the strategic level of an organization?

A.   Generally better suited for larger applications

B.   Make use of existing phone lines

C.   Personal e-mail received from outside by the organization's system

D.   Executive support system (ESS)

9: Of the following file organization methods - the only one that can be used on magnetic tape is

A.   Logical

B.   Sequential

C.   Asynchronous

D.   Using serif typefaces in graph labels

10: Which of the following signifies the international reference model for linking different types of computers and networks?

A.   Personal e-mail received from outside by the organization's system

B.   OSI

C.   Simplified testing and documentation procedures

D.   Analysis

11: Which of the following styles of systems development is most often used for information systems at the enterprise level?

A.   Index server

B.   Traditional life cycle

C.   Asynchronous transfer mode (ATM)

D.   Object-oriented

12: When all the elements in a system are in the same category - ______ is said to be at a minimum.

A.   Include enterprise-wide data - collected from legacy systems

B.   Uncertainty

C.   Ordinality

D.   Loan officers at a bank enter application information into a central system so that the application can be evaluated by many people at once.

13: The predominant programming language for business was

A.   Involve slight increases in program development and maintenance costs

B.   Data conversion

C.   Edit checks

D.   COBOL

14: Which of the following is NOT a type of knowledge work system (KWS)?

A.   Track

B.   Decision support system (DSS)

C.   Operations

D.   Electronic bulletin board

15: The most time-consuming element of system conversion plans is

A.   Make use of existing phone lines

B.   FOCUS

C.   Heterarchy

D.   Data conversion

16: Which of the following types of organizations is LEAST likely to make use of a hierarchical database?

A.   Consultancies/service organizations

B.   Defining business processes

C.   Source

D.   Transaction processing system (TPS)

17: The representation of data as they appear to an application programmer or end user is described as a(n) _____ view.

A.   First

B.   Fuzzy logic

C.   Seek a generalized capability to learn

D.   Logical

18: Which of the following types of applications is generally most dependent on the graphical user interface (GUI) environment?

A.   Implementation

B.   Operations

C.   Normalization

D.   Desktop publishing

19: In its current form - the technology of electronic data interchange (EDI) is appropriate for transmitting all of the following EXCEPT

A.   Homogeneous data

B.   Transduction

C.   A modem or modems

D.   Solicitations

20: A processing system rejects an order transaction for 10 -000 units - on the basis that no order larger than 70 units had been placed previously. This is an example of a

A.   Operations

B.   Reasonableness check

C.   OSI

D.   Tuple

21: Which of the following storage media generally has the slowest access speed?

A.   Design specifications

B.   Magnetic disk

C.   Dialog

D.   Heuristic

22: In an individual MIS - the most commonly-used technique for conducting operations research is ______ programming.

A.   Personal e-mail received from outside by the organization's system

B.   Linear

C.   Hospital information system

D.   Logical application groups

23: Which of the following concerns is addressed by front-end CASE (computer-assisted software engineering) tools?

A.   Protocols

B.   Knowledge work system (KWS)

C.   Analysis

D.   Asynchronous

24: The predefined packet of data in some LANs - which includes data indicating the sender - receiver - and whether the packet is in use - is known as a

A.   30-50

B.   Data models

C.   Token

D.   Reliability of many computers

25: _____ tools is a project management technique that structures and sequences tasks - and budgets the time - money - and technical resources required to complete these tasks.

A.   Formal planning

B.   Goals

C.   Operations

D.   Bottom-up

26: A transmission over a telecommunications network in which data can flow two ways - but in only one direction at a time - is described as

A.   Manual procedures

B.   Tuple

C.   COBOL

D.   Half duplex

27: Each of the following is a rule of thumb for handling graphics in desktop publishing application EXCEPT

A.   Make use of existing phone lines

B.   Seek a generalized capability to learn

C.   Using serif typefaces in graph labels

D.   Relatively slower speed of operation

28: Which of the following are included in an MIS audit?

A.   Using serif typefaces in graph labels

B.   A top-down method

C.   Physical facilities - telecommunications - control systems - and manual procedures

D.   Kilobytes

29: Which of the following is most likely to rely on parallel processing?

A.   Supercomputer

B.   Forward engineering

C.   Asynchronous

D.   Hospital information system

30: Routines performed to verify input data and correct errors prior to processing are known as

A.   Generally better suited for larger applications

B.   Hospital information system

C.   Decision support system (DSS)

D.   Edit checks

31: ____ consists of predrawn electronic images.

A.   ASCII art

B.   Graphics art

C.   Clip art

D.   Drawing art

32: ____ are normally expressed in the form of rules.

A.   Attributes

B.   Entities

C.   Relationships

D.   Constraints

33: ____ converts a table that is in third normal form to a table no longer in third normal form.

A.   Conversion

B.   Denormalization

C.   Normalization

D.   Replication

34: ____ generally uses internal data and responds in real time.

A.   QBE

B.   OLAP

C.   SQL

D.   OLTP

35: ____ implies that no site should depend on another site to perform its database functions.

A.   No reliance on a central site

B.   Local autonomy

C.   Continuous operation

D.   Fragmentation transparency

36: ____ is a process for controlling changes in system requirements during software development.

A.   Critical risk

B.   Capacity planning

C.   Configuration management

D.   Avoidance

37: ____ policy creates standards for using corporate e-mail.

A.   E-mail

B.   File servers

C.   Web servers

D.   Access servers

38: ____ provide(s) an employee more control over his or her work situation.

A.   Job enlargement

B.   Job rotation

C.   Job characteristics

D.   Job enrichment

39: ____ refers to identifying the browser used by each visitor, typically via javascript code.

A.   Browser mapping

B.   Browser sniffing

C.   Visitor identification

D.   Personalization

40: ____ rules specify which users have what type of access to which data in the database.

A.   Encryption

B.   Authentication

C.   Authorization

D.   View

41: ____ uses multiple sources of information and provides multidimensional analysis.

A.   OLAP

B.   SQL

C.   QBE

D.   OLTP

42: _____ are an example of internal source of data for an information system.

A.   Personnel records

B.   Competitors

C.   Population statistics

D.   Economic conditions

43: _____ is an example of an enterprise-class electronic software.

A.   Microsoft COM

B.   Sales Cart

C.   Oracle E-Business Suite

D.   Common Object Request Broker Architecture

44: ________ deals with more objective, rational, and technical knowledge.

A.   Explicit information

B.   Explicit knowledge

C.   Tacit information

D.   Tacit knowledge

45: ________ involve the people and procedure components of information systems.

A.   Malware

B.   Passwords

C.   Human safeguards

D.   Advanced persistent threat

46: ________ specifies the characteristics of a field, such as the type of data it will hold.

A.   Data definition

B.   A record

C.   Database architecture

D.   An entity

47: A building, office equipment, computer hardware, and network equipment are examples of _____.

A.   Mission and vision

B.   Analyze situation

C.   Adjourning

D.   Capital assets

48: A group of similar rows or records is known as ________.

A.   Table

B.   Record

C.   Row

D.   Column

49: Adware and spyware are similar to each other in that they both ________.

A.   Reside in the background and observe a user's behavior

B.   Immediately change the password they are given to a password of their own.

C.   Perimeter firewall

D.   Data safeguards

50: Data type helps a database management system (dbms) to ________.

A.   Present the data in a useful format

B.   Format data

C.   Allocate storage space