Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)

1
Managers involved with a firm's information system need to possess several relevant skills. Which one of the following would not be an expected prevalent skill for managers of this type to exhibit?
A)Ability to arrange technology financing plans
B)Ability to organize data to facilitate analysis
C)Ability to compare information to other similar firms
D)Ability to adapt standard practices to new technology
E)Ability to control data distribution
2
A MIS provides access to important information used in numerous management activities. Of the following, _____ is not such an activity to which a MIS contributes.
A)planning
B)communication
C)decision making
D)political affiliation
E)HRM
3
For any information obtained via a MIS to be valuable in decision making, it must have all the following characteristics except _______.
A)relevancy
B)indistinctiveness
C)timeliness
D)quality
E)reliability
4
If Alex obtains statistics that indicates the number of hours each employee works per year in his department, he is most probably obtaining ____.
A)information
B)a data warehouse
C)data
D)a database
E)raw information
5
The Internet is an example of which of the following?
A)Database
B)Data Mining
C)Executive information system
D)Data warehouse
E)Decision support system
6
All of the following are correct about databases with the exclusion of ________.
A)prevents employment turnover
B)allows users to sort data by characteristics
C)users can generate various reports
D)confidential information can be restricted
E)represent the hub of an MIS
7
Of the following, which is not likely to be a reason why marketing departments utilize data mining?
A)Improve customer retention
B)Customer segmentation analysis
C)Pricing analysis
D)Cross-selling opportunities
E)Prevent fraud
8
IT includes basic data processing operations such as all of the following except for _______.
A)Manipulating
B)Retrieving
C)Tabulating
D)Displaying
E)Storing
9
A grocery store's checkout system is doing which of the following when it calculates up the customer's bill?
A)Diversifying information
B)Manipulating information
C)Storing information
D)Retrieving information
E)Captures information
10
Which of the following is not an example of a device or type of technology used to perform the IT function of transmission?
A)Radio
B)Laser printer
C)Television
D)Fiber optic cable
E)Electronic mail
11
Which one of the following is not considered a computer responsibility of an employee?
A)Keep file to a minimum
B)Frequently scan the system for viruses
C)Delete unwanted messages immediately
D)Immediately open all mail attachments
E)Stay professional with content
12
A private or semiprivate internal network is often referred to as a/an _______.
A)extranet
B)intranet
C)LAN
D)ethernet
E)internet
13
Of the following which type of software can be used to graphically display and manipulate a product or component?
A)Applications software
B)Operating system software
C)Legal software
D)Artificial intelligence software.
E)Computer-aided design.
14
When an organization decides to undertake establishing an intranet, it should conduct all of the following except _______.
A)derive feedback
B)test the program
C)competitor approval
D)research the program
E)define the need
15
Which of the following is not a valid reason company leaders decide to implement ERP in their organizations?
A)Increase productivity
B)Competitors have it
C)Staff reduction
D)Integrate financial data
E)Standardize HR information
16
________ is the analysis of the nature and social impact of computer technology and the development of policies for its appropriate use.
A)CAD
B)ERG
C)Computer ethics
D)ERP
E)Socialization integration
17
The need for computer ethics policies has arisen from several sources. Which one would not be considered a rationale for the need of such ethics policies to be in effect?
A)Communication is cheap
B)Huge amounts of information can be quickly retrieved
C)Various purposes for the information
D)Trusted operators
E)Depersonalization
18
Information security is a primary concern for organizations. Of the following, which is not a type of security system or device for organizations to employ?
A)User names
B)Universal password
C)Firewalls
D)Encryption
E)Scanning
19
______ is software that attaches itself to a personal computer without the user's knowledge, track's the user's online activities, and occasionally sends popup advertisements across the screen.
A)Trojan
B)Virus
C)Spyware
D)Worm
E)Adware
20
A survey of 500 corporations by the Computer Security Institute revealed that ___ percent of the companies had been broken into.
A)60
B)70
C)75
D)80
E)85
21
Organizations currently use many types of information systems. Which one of the following is not a recognized information system?
A)Support group system
B)Process control system
C)Expert system
D)Neural network system
E)Artificial intelligence system
22
_______ is an operations information system used to maintain and publish information for an organization.
A)Process control systems
B)Office automation systems
C)Transaction-processing systems
D)Expert systems
E)Management-information system
23
Which of the following management information systems is best identified as that which provides information to facilitate strategic decision making?
A)Decision support system
B)HRIS
C)Executive information system
D)Information reporting system
E)Group decision support system







Management, 3/eOnline Learning Center

Home > Chapter 18 > Multiple Choice Quiz