Try to answer these 40 Controlling Information and Operations MCQs and check your understanding of the Controlling Information and Operations subject. Scroll down and let's begin!
A. Budget
B. Artificial intelligence (AI)
C. Audit
D. Balance sheet
A. Budget
B. Artificial intelligence (AI)
C. Audit
D. Balance sheet
A. True
B. False
A. Big-data analytics
B. Big data
C. Both a and b
D. Budget
A. Budget
B. Concurrent control
C. Control
D. Data analytics
A. Budget
B. Concurrent control
C. Control
D. Data analytics
A. Budget
B. Concurrent control
C. Control
D. Data analytics
A. Cybersecurity audit
B. Concurrent control
C. Control
D. Data analytics
A. Cybersecurity audit
B. Concurrent control
C. Control
D. Data analytics
A. True
B. False
A. Enterprise resource planning (ERP)
B. Executive support system (ESS)
C. Feedback control
D. Feedforward control
A. True
B. False
A. Enterprise resource planning (ERP)
B. Executive support system (ESS)
C. Feedback control
D. Feedforward control
A. True
B. False
A. Processes
B. Policies
C. Procedures
D. All of these
A. Financial statement
B. Income statement
C. Information technology (IT)
D. Infrastructure as a service (IaaS)
A. Financial statement
B. Income statement
C. Information technology (IT)
D. Infrastructure as a service (IaaS)
A. System
B. Software
C. Network
D. All of these
A. Financial statement
B. Income statement
C. Information technology (IT)
D. Infrastructure as a service (IaaS)
A. True
B. False
A. ISO 9000 series
B. ISO 14000 series
C. Just-in-time (JIT) method
D. None of these
A. ISO 9000 series
B. ISO 14000 series
C. Just-in-time (JIT) method
D. None of these
A. True
B. False
A. Kaizen
B. Lean manufacturing
C. Learning management system (LMS)
D. Machine learning (ML)
A. True
B. False
A. Last Man Standing
B. Library Management System
C. Learning management system
D. Load Management System
A. Malware
B. Management information system (MIS)
C. Phishing
D. Machine learning (ML)
A. Replicates itself and spreads from computer to computer
B. Codes that corrupt the system and destroy data
C. A type of code that can take control of your computer
D. All of these
A. A model that provides customers with access to hardware and software tools for application development
B. A tool that aids organizations to run more efficiently by incorporating people, technology, and information systematically.
C. The study of computer algorithms that allow computer programs to automatically improve through experience.
D. All of these
A. Phishing
B. Platform as a service (PaaS)
C. Purchasing
D. Ransomware
A. Platform as a service (PaaS)
B. Purchasing
C. Ransomware
D. Phishing
A. Purchasing
B. Ransomware
C. Six Sigma
D. Social engineering
A. Social engineering
B. Ransomware
C. Six Sigma
D. None of these
A. Six Sigma
B. Social engineering
C. Standards
D. Supply chain
A. Six Sigma
B. Social engineering
C. Standards
D. Supply chain
A. Standards
B. Supply chain
C. Software as a service (SaaS)
D. Six Sigma
A. Standards
B. Supply chain
C. Software as a service (SaaS)
D. Six Sigma
A. Software Quality Control
B. Statistical quality control
C. Singapore Quality Class
D. None of these
A. Statistical quality control
B. Transaction processing system
C. Supply chain
D. None of these
A. Statistical quality control
B. Transaction processing system
C. Supply chain
D. None of these