Mis module 3 ida mcqs

Management of Information Systems

MIS Module 1 IDA

Section 1 Multiple Choice Questions

1. There are five factors to consider when assessing the growing impact of IT in business firms both today and over the next ten years. Which one of the following is NOT one of those factors?   
A) Internet growth and technology convergence
B) Transformation of the business enterprise
C) Growth of the globally connected economy
D) Emergence of more personal appliances
E) A and D

2. The system with universally accepted standards for storing, retrieving, formatting, and displaying information in a networking environment is called:   
A) the Internet
B) the Information Superhighway
C) the World Wide Web.
D) the intranet
E) the Extranet

3. Enterprise applications do all of the following EXCEPT:   
A) Span the entire firm.
B) Treat functional areas as separate “islands” of information.
C) Integrate information from multiple functions.
D) Integrate business processes to enhance organizational performance
E) A and B

4. Interrelated components working together to collect, process, store, and disseminate information to support decision making, coordination, control, analysis, and visualization in an organization best defines:
A) business functions. 
B) information system. 
C) standard operating procedures. 
D) business processes. 
E) informal system. 

5. To understand information systems, one must understand:
A) the problems they are designed to solve. 
B) their architectural and design elements. 
C) organizational processes. 
D) all of the above. 
E) none of the above 

6. A major change in the relationship between information systems and organizations is: 
A) the level of interest in information systems within all employee groups has increased. 
B) that managing systems today involves a much larger part of the organization today than it did in the past. 
C) that there is increased competition between the two. 
D) that newer organizations have an edge over older ones. 
E) the decreased dependence on mainframe systems. 

7. Horizontal systems automating business processes crossing functional and hierarchical boundaries:
A) are not necessary if the system is properly designed. 
B) must be considered in the original architecture of the system. 
C) are typically built after major functional systems are in place. 
D) are usually informal. 
E) are necessary only if the system is an extranet. 

8. The interaction between information systems and organization is influenced by: 
A) organizational structure. 
B) standard operating procedures. 
C) politics and culture. 
D) environment and management decisions. 
E) all of the above. 

9. The Internet is capable of reducing ______________for most organizations. 
A) information usage. 
B) reporting and analysis. 
C) systems costs. 
D) transaction costs. 
E) none of the above. 

10. Operational-level systems are information systems that support the: 
A) long-range planning activities of senior management. 
B) knowledge and data workers in an organization. 
C) decision-making and administrative activities of middle managers. 
D) day-to-day processes of production and shipping only. 
E) elementary activities and transactions of the organization

11. Enterprise systems promise to greatly change four dimensions of business: firm structure, management process, business capability, and:
A) employee training 
B) tax responsibility. 
C) capital expense procedures. 
D) technology platform. 
E) profit margin. 

12. The rapid communication of changes in product design is one way information systems can facilitate: 
A) supply chain management. 
B) outsourcing. 
C) managerial efficiency. 
D) collaborative planning. 
E) JIT inventory practices. 

13. From an economic standpoint, information system technology can be viewed as a: 
A) transaction mediator. 
B) product or service in itself. 
C) factor of production that can be freely substituted for capital and labor. 
D) capital expenditure. 
E) cost of doing business in any environment in today’s global economy. 

14. Business-to-business Web sites can save participants anywhere from 5 to 45 percent over past expenses by providing more opportunities for finding the lowest-priced products and services, and by:
A) the opportunity to evade the payment of sales taxes. 
B) eliminating inefficient paper-based processes for many business procedures. 
C) revealing competitors’ supply chains. 
D) the opportunity to create extranets. 
E) providing just-in-time inventory control procedures.
 
15. Companies pursuing electronic commerce must be especially vigilant about:
A) maintaining updated transaction files. 
B) constantly updating their business plan. 
C) maintaining a shopping cart and online credit transactions. 
D) establishing trust, security, and consumer privacy. 
E) establishing a well-designed Web site. 

16. Information technology and information systems raise new ethical questions for both individuals and societies because:
A) so few people understand them. 
B) they change so quickly. 
C) they are difficult for governments to regulate. 
D) they are global in their effects. 
E) they create opportunities for intense social change

17. Advances in data storage techniques and rapidly declining storage costs have: 
A) made new solutions to ethical problems possible. 
B) created congressional interest in evolving laws to protect them. 
C) been a boon to offshore companies. 
D) created more secure data banks. 
E) made the routine violation of individual privacy both cheap and effective. 

18. Advances in networking, including the Internet, promise to reduce greatly the costs of:
A) maintaining surveillance over employee Internet use. 
B) security and encryption. 
C) liability for the use of data for reasons other than those for which it was gathered. 
D) moving and accessing large quantities of data. 
E) advertising on the Web sites of other companies. 

19. The Risk Aversion Principle states that: 
A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. 
B) one should take the action that produces the least harm or incurs the least cost. 
C) one can put values in rank order and understand the consequences of various courses of action. 
D) if an action is not right for everyone to take, it is not right for anyone to take. 
E) everything is owned by someone else, and that the creator wants compensation for his work. 

20. The privacy protection function of managing cookies is concerned with:
A) allowing users to surf the Web without being identified. 
B) scrambling data so that it can’t be read. 
C) blocking or limiting cookies. 
D) giving users more control over personal information gathered on Web sites they visit. 
E) controlling pop-up ads based on user profiles and preventing ads from collecting or sending information. 

21. Clarifying and agreeing on layers of IT value is the first step involved in developing and delivering on:
A) IT project completion.
B) IT planning.
C) IT budgeting.
D) the IT value proposition.
E) all of the above.

22. The concepts of IT value include all of the following EXCEPT:
A) WHERE and WHEN the value will be delivered
B) the COST of the value delivered
C) WHAT value is delivered
D) WHO will deliver the value
E) the VALUE of what is delivered

23. The development of integrated, cross-functional systems have:
A) increased the importance of technology strategy but not corporate strategy
B) increased the importance of value models
C) increased the importance of corporate strategy but not technology strategy
D) increased the importance of corporate and technology strategy that cross traditional lines of business
E) None of the above

24. The type of IT Strategy initiative which addresses hardware, software and communications issues is called a/an
A) Opportunity leverage initiative
B) Business enabling initiative
C) Infrastructure initiative
D) Business opportunities initiative
E) Business improvement initiative

25. IT leaders are now making significant strides in articulating IT strategy
and linking it more effectively with
A) business opportunity
B) business enabling
C) business strategy
D) business improvement
E) None of the above

26.  One metric used to evaluate IT effectiveness is:
A) customer satisfaction
B) management satisfaction
C) employee satisfaction
D) both customer and employee satisfaction
E) None of the above

27. IT projects are considerably more complex than those of the past in that they involve many more elements, such as
A) risk management and adherence to numerous laws, regulations, and standards
B) integration across multiple platforms and business units
C) customer centric services, information and content management
D) All of the above
E)Both A and C
 
28. Transporting sensitive personal information across organizational and national boundaries could
A) produce inaccurate or invalid information that could mislead auditors
B) create a sense of distrust among investors
C) produce inaccurate or invalid information that could  tax officials and inspectors
D) create a sense if distrust among the public
E) All of the above

29. In practice, ________ refers to the structure, roles, procedures, and internal and external relationships that ensure that IT is well managed and can provide the necessary information to run the organization
A) Physical and virtual access
B) IT Governance
C) IT strategic planning
D) Security architecture
E) Business continuity planning

30. Which of the following IT elements addresses all data and information produced and/or stored by IT?
A) Information architecture, access to data, data administration
B) Competitive advantage, risk assessment, project management
C) IT strategic planning, competitive advantage, increased costs
D) Risk assessment, new opportunities, IT strategic planning
E) IT strategic planning, risk assessment, project management   

 

MIS Module 2 IDA  

Section 1 Multiple Choice Questions.

1.In a relational database, a student, an order, and a book are all examples of a(n):
A) key field
B) file
C) entity
D) primary key
E) attribute

2. In a relational database, a record is composed of:
A) many objects
B) many fields
C) many tables
D) many files
E)  many rows

3. In a relational database, the three basic operations used to develop useful sets of data are:
A) select, project, and join
B) select, from, and join
C) select, project, and where
D) select, from, and where
E) select, join, and where

4. Normalization takes place during the following database development phase:
A) conceptual data modeling
B) logical database design
C) physical database design
D) implementation
E) none of the above

5. Data-mining is often used to provide:
A) financial analysis
B) information for targeted marketing
C) online business processing
D) graphical reporting facilities
E) credit reports

6. A database management system (DBMS) reduces data redundancy and inconsistency by:
A) enforcing referential integrity
B) uncoupling program and data
C) utilizing a data dictionary
D) minimizing isolated files with repeated data
E) none of the above

7. In a table for customers, the information about a single customer would reside in a single:
A) field
B) row
C) column
D) table
E) both A and C

8. The type of database management that handle multimedia is the:
A) hierarchical DBMS
B) relational DBMS
C) network DBMS
D) object-oriented DBMS
E) none of the above 

9. A schematic of the entire database that describes the relationships in a database is called a(n):
A) data dictionary
B) intersection relationship diagram
C) entity-relationship diagram
D) data definition diagram
E) data manipulation diagram

10. A data warehouse is composed of:
A) historical data from legacy systems
B) current data
C) internal and external data sources
D) historic and current internal data
E) all government related data

11. The number of times a signal changes value per second is called the _____rate.
A) hertz
B) baud
C) watts
D) volts
E) signal

12. The Internet is based on which three key technologies?
A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers
D) Client/server computing, packet switching, and HTTP
E) None of the above

13. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called
A) Multiplexing
B) Packet switching
C) Packet routing
D) HTTP
E) ATM

14. In TCP/IP, IP is responsible for
A) disassembling and reassembling of packets during transmission.
B) establishing an Internet connection between two computers.
C) moving packets over the network
D) sequencing the transfer of packets
E) user authentication
 
15. To use an analog telephone system for sending digital data, you must use:
A) a modem
B) a router
C) Fiber optic
D) Twisted wire
E) DSL

16. Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
A) WAN network in infrastructure mode
B) Domain-based LAN
C) Peer-to-peer network
D) Campus area network
E) MAN network

17. Bandwidth is the
A) number of frequencies that can be broadcast through a medium
B) number of cycles per second that can be sent through a medium
C) difference between the highest and lowest frequencies that can be accommodated on a single channel
D) total number of bytes that can be sent through a medium per second
E) number of signals than can be send over one communication chanell

18. Which organization helps define the overall structure of the Internet?
A) None (no one “owns” the Internet)
F) World Wide Web Consortium
G) ICANN
H) IAB
I) Each country

19. A virtual private network (VPN)
A) is an encrypted private network configured within a public network
B) is more expensive than a dedicated network
C) provides secure, encrypted communications using Telnet
D)  is an Internet-based service for delivering voice communications.
E) is a very fast access to the Internet established by phone companies

20. What technology allows people to have content pulled from Web sites and fed automatically to their computers
A) FTP
B) RSS
C) HTTP
D) Bluetooth
E) VPN

21. ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its accounting records, and operational adherence to management standards
A) “legacy systems”
B) “SSID standards”
C) “System Vulnerabilities”
D) “Controls”
E) “Security”

22.  Specific security challenges that threaten the communications lines in a client/server environment include
A) tapping; sniffing; message alteration; radiation
B) hacking; vandalism; denial of service attacks
C) theft, copying, alteration of data; hardware or software failure
D) unauthorized access; errors; spyware
E) none of the above

23. A key logger is a type of
A) worm
B) trojan horse
C) virus
D) password protection
E) spyware

24. Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack
A) Disk defense of system 
B) Crash
C) Pharming
D) Phishing
E) Denial of service 

25.  The Sarbanes-Oxley Act
A) requires financial institutions to ensure the security of customer data
B) specifies best practices in information systems security and control.
C) imposes responsibility on companies and management to safeguard the accuracy of financial information
D) outlines medical security and privacy rules for employees of a company
E) specifies the rule that governs the use of the Internet

26. Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)
A) security policy
B) risk analysis
C) risk avoidance
D) risk assessment
E) risk mitigation

27. A firewall allows the organization to
A) enforce a security policy on traffic between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet
C) create an enterprise system on the Internet
D) check the content of all incoming and outgoing e-mail messages
E) check for over used computers in a network

28. A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a
A) distribution channel
B) supply chain
C) value chain
D) marketing channel
E) demand forecasting

29.  Companies with effective supply chain management systems can expect
A)  improved customer service and responsiveness
B) Cost reduction
C) Reduced inventory levels
D) All the above
E) None of the above

30. Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?
A) Customer lifetime value
B) churn rate
C) cost per lead
D) cost per sale
E) total cost of ownershi

MIS Module 3 IDA

Section1-Multiple Choice Questions.

1. The quality of ubiquity, as it relates to e-commerce, is illustrated by
A) the same set of standards being used across the globe
B) plentiful, cheap information
C) the enabling of commerce worldwide
D) the availability of Internet technology everywhere and anytime
E) the Internet is free to use

2. Which of the following is NOT a recent development in e-commerce?
A) transformation of the music recording industry
B) growth of wireless Internet connections
C) online, interactive models for newspapers and other traditional media
D) online, interactive models for banking
E) only C and D

3. Which of the following is NOT one of the unique features of e-commerce technology?
A) information density
B) transparency
C) richness
D) social technology
E) disintermediation

4. The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?
A) ubiquity
B) personalization/customization
C) interactivity
D) richness
E) none of the above

5. The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?
A) ubiquity
B) personalization/customization
C) interactivity
D) richness
E) none of the above

6. The lowered costs of information storage, processing, and communication, along with the improvement of data quality has resulted in which unique quality of e-commerce?
A) information density
B) richness
C) customization
D) only A and B
E) only B and C

7. Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party
A) transparency
B) asymmetry
C) complexity
D) imbalance
E) density

8. Reducing the business process layers in a distribution channel is called
A) market segmentation
B) business process engineering
C) streamlining
D) network economy
E) disintermediation

9. Which of the following Internet business models does Amazon.com use?
A) information broker
B) transaction broker
C) online service provider
D) virtual store front
E) content provider

10. Tools that record customer activities at Web sites and store them in a log for further analysis are called ________ tools
A) clickstream tracking
B) customer tracking
C) collaborative tracking
D) customer filtering
E) information filtering

11. Expertise and experience of organizational members that has not been formally documented best describes
A) wisdom
B) information
C) explicit knowledge
D) tacit knowledge
E) data

12. Which of the following is a type of intelligent technique?
A) knowledge networks
B) case-based reasoning (CBR)
C) computer-aided design
D)  virtual reality modeling language (VRML)
E) None of the above

13. Technology that consists of computer-based systems that attempt to emulate human behavior is called
A) fuzzy logic
B) neural networks
C) artificial intelligence
D) genetic algorithms
E) case-based reasoning

14. You are an automotive engineer working on an application that will automatically parallel park a car. The intelligent technique you may find most useful is:
A) case-based reasoning
B) artificial intelligence
C) fuzzy logic
D) expert systems
E) neural networks
 
15. Which type of decision is deciding whether to introduce a new product line?
A) structured
B) unstructured
C) recurring
D) nonrecurring
E) none of the above

16. Simon’s description of decision making consists of which four stages?
A) planning, financing, implementation, and maintenance
B) planning, design, implementation, and maintenance
C) intelligence, design, financing, and implementation
D) planning, organizing, executing, and controlling
E)   intelligence, design, choice, and implementation

17. The concern that the structure of data is consistent within an information source reflects which quality dimension of information?
A) accuracy
B) integrity
C) validity
D) consistency
E) availability

18. The four kinds of structural organizational change enabled by IT, in order from least to most risky, are:
A) automation, rationalization, reengineering, and paradigm shift.
B) rationalization, automation, reengineering, and redesigning
C) rationalization, automation, reengineering, and paradigm shift
D) automation, redesigning, restructuring, and paradigm shift
E) paradigm shift, reengineering, automation, rationalization

19. Which process develops a detailed description of the functions that a new information system must perform?
A) feasibility study
B) requirements analysis
C) system design
D) test plan development
E) structured walkthrough

20.  Information systems design:
A) describes what a system should do to meet information requirements
B) shows how the new system will fulfill the information requirements
C) identifies which users need what information, where, when and how
D) is concerned with the logical view of the system solution
E) None of the above

21. Transferring data from a legacy system to the new system would be defined by which category of system design specifications?
A) Input
B) Output
C) Database
D) Control
E) Conversion

22. In a parallel conversion strategy, the new system
A)  is tested by an outsourced company
B)  replaces the old one at an appointed time
C)  and the old are run together for some time.
D)  is introduced in stages.
E) Is tested and converted by test engineers.

23. Acceptance testing
A) includes all the preparations for the series of tests to be performed on the system
B) tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned
C) tests each program separately
D) provides the final certification that the system is ready to be used in a production setting
E) only A and B

24. The primary tool for representing a system’s component processes and the flow of data between them is the
A) data dictionary.
B) Process specification diagram
C) User documentation
D) data flow diagram
E) flow charts

25. In object-oriented development
A) the class is used as the basic unit of systems analysis and design. 
B) an object is a collection of data that is acted on by external processes
C) processing logic resides within objects
D) a strict, step-by-step development process is essential
E) processing logic resides outside objects

26. Object-oriented development could potentially reduce the time and cost of writing software because
A) objects are reusable
B) object-oriented programming requires less training
C) iterative prototyping is not required
D) a single user interface object can be used for the entire application
E) object can be bought as package software

 

27. As a technical project manager you have decided to propose implementing a prototyping methodology for a small Web-based design project. What is the order of steps you will follow in this project?
A) Develop the prototype; use the prototype; revise and enhance the prototype
B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype
C) Define the requirements, develop solutions, select the best prototype, and implement the prototype
D) Define the requirements, develop the prototype, revise and enhance the prototype
E) Design the prototype, develop the prototype, test the prototype, document the system

28. Management should control the development of end-user applications by
A) developing a formal development methodology
B) requiring cost justification for end-user IS projects
C) establishing standards for user-developed applications
D) both B and C
E) both A and B

29. A critical success factors (CSF) approach to establishing an enterprise’s information requirements is especially suitable for
A) distinguishing between individual and organizational objectives 
B)  identifying the key entities and attributes of the organization’s data
C) understanding how organizational units define critical data
D) the development of transaction processing systems for accounting
E) focusing organizational attention on how information should be handled

30. The worth of systems from a financial perspective essentially revolves around the issue of
A) critical success factors (CSFs)
B) asset utilization
C) adherence to information requirements
D) return on invested capital
E) return on sale  







Calculate Your Essay Price
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 10% with the coupon code: best10