MCQOPTIONS
 Saved Bookmarks
				This section includes 600 Mcqs, each offering curated multiple-choice questions to sharpen your General Management knowledge and support exam preparation. Choose a topic below to get started.
| 151. | 
                                    ________________ monitors and control industrial processes. | 
                            
| A. | ransaction Processing Systems | 
| B. | rocess Control Systems | 
| C. | nterprise Collaboration Systems | 
| D. | anagement Information Systems | 
| Answer» C. nterprise Collaboration Systems | |
| 152. | 
                                    POS stands for ____. | 
                            
| A. | oint Of Structure | 
| B. | oint Of Sale | 
| C. | roduct Of Structure | 
| D. | roduct Of Sale | 
| Answer» C. roduct Of Structure | |
| 153. | 
                                    Sales and inventory processing and accounting systems are examples of __________ systems. | 
                            
| A. | ransaction Processing | 
| B. | rocess Control | 
| C. | nterprise Collaboration | 
| D. | anagement Information | 
| Answer» B. rocess Control | |
| 154. | 
                                    ____ type of processing, data is processed immediately after a transaction occurs. | 
                            
| A. | atch | 
| B. | arallel | 
| C. | equence | 
| D. | eal time | 
| Answer» E. | |
| 155. | 
                                    Information System specialists also called as ______. | 
                            
| A. | ser consultant | 
| B. | ser friendly | 
| C. | ser expert | 
| D. | ser manager | 
| Answer» B. ser friendly | |
| 156. | 
                                    The results of "what-if" questions asked repeatedly to determine the impact of changes in one or more factors on the outcomes are called__________________. | 
                            
| A. | ata modeling | 
| B. | orecasting | 
| C. | lassification clusters | 
| D. | ensitivity analysis | 
| Answer» E. | |
| 157. | 
                                    ATG in network stands for ____. | 
                            
| A. | dvanced Technology Groups | 
| B. | dvanced Technical Groups | 
| C. | dvanced Talent Groups | 
| D. | dvanced Testing Groups | 
| Answer» B. dvanced Technical Groups | |
| 158. | 
                                    A type of decision in which there may be several "right" answers and no precise way to get a right answer is ____________________. | 
                            
| A. | tructured decision | 
| B. | nstructured decision | 
| C. | ecurring decision | 
| D. | onrecurring decision | 
| Answer» C. ecurring decision | |
| 159. | 
                                    Program testing concept use ________ approaches | 
                            
| A. | equence | 
| B. | arallel | 
| C. | op-down | 
| D. | ottom-up | 
| Answer» D. ottom-up | |
| 160. | 
                                    Decision support system involves all of the following types of analytical modeling activities except? | 
                            
| A. | hat-if analysis | 
| B. | ensitivity analysis | 
| C. | oal-seeking analysis | 
| D. | euristics | 
| Answer» E. | |
| 161. | 
                                    RFP stands for ______. | 
                            
| A. | equest for Proposal | 
| B. | equest for Process | 
| C. | equest for Product | 
| D. | equest for Prediction | 
| Answer» B. equest for Process | |
| 162. | 
                                    Which one of the following is used for evaluating credit risks? | 
                            
| A. | irtual Reality | 
| B. | eural Network | 
| C. | uzzy logic | 
| D. | one of the above | 
| Answer» C. uzzy logic | |
| 163. | 
                                    _____ leader who commands both positional and personal influence. | 
                            
| A. | eam | 
| B. | roject | 
| C. | ormal | 
| D. | nformal | 
| Answer» D. nformal | |
| 164. | 
                                    A _____ types of processor design uses a group of instruction processors to execute program at the same time. | 
                            
| A. | oupled | 
| B. | ultilevel | 
| C. | arallel | 
| D. | ingle | 
| Answer» D. ingle | |
| 165. | 
                                    In which of the following types of analysis, the goal is to find the optimum value for one or more target variables, given certain constraints? | 
                            
| A. | hat if analysis | 
| B. | ptimization | 
| C. | oal seeking analysis | 
| D. | one of these | 
| Answer» C. oal seeking analysis | |
| 166. | 
                                    The evolution of Electronic data processing_______ | 
                            
| A. | 951-60 | 
| B. | 961-70 | 
| C. | 981-90 | 
| D. | 971 | 
| Answer» B. 961-70 | |
| 167. | 
                                    ________ type of testing ensures the system is free of errors and is ready to be placed into operation. | 
                            
| A. | udit | 
| B. | eneral | 
| C. | echnical | 
| D. | ata | 
| Answer» B. eneral | |
| 168. | 
                                    GB in memory stands for _____. | 
                            
| A. | iga Bytes | 
| B. | iga Bits | 
| C. | if Bits | 
| D. | if Bytes | 
| Answer» B. iga Bits | |
| 169. | 
                                    In _____ organization, authority is delegated down the hierarchy. | 
                            
| A. | raditional | 
| B. | lassical | 
| C. | perational | 
| D. | bsolute | 
| Answer» C. perational | |
| 170. | 
                                    PDA means ______. | 
                            
| A. | ocket Data Assistants | 
| B. | ersonal Data Assistants | 
| C. | ocket Digital Assistants | 
| D. | ersonal Digital Assistants | 
| Answer» E. | |
| 171. | 
                                    The emerging class of applications focuses on personalized decision support, modeling, information retrieval, data warehousing, what-if scenarios and reporting is called __________________. | 
                            
| A. | ecision Support Trends | 
| B. | ecision Support History | 
| C. | ecision Support models | 
| D. | ecision Support class | 
| Answer» B. ecision Support History | |
| 172. | 
                                    In punched card system, holes are punched by device are called ______. | 
                            
| A. | ole | 
| B. | ey stroke | 
| C. | ey punch | 
| D. | canning | 
| Answer» D. canning | |
| 173. | 
                                    Which of the following level of managers develop short and medium range plans, schedules, and budgets and specify the policies, procedures, and business objectives for their sub units of the company? | 
                            
| A. | trategic | 
| B. | actical | 
| C. | perational | 
| D. | ront Line | 
| Answer» C. perational | |
| 174. | 
                                    The analysis and design of application systems are the responsibility of a ___________. | 
                            
| A. | omputer Operator | 
| B. | rogrammer | 
| C. | ystem Analyst | 
| D. | ata entry operator | 
| Answer» D. ata entry operator | |
| 175. | 
                                    Critical information for top management is provided by ____ information system. | 
                            
| A. | xpert | 
| B. | xecutive | 
| C. | ecision | 
| D. | anagerial | 
| Answer» C. ecision | |
| 176. | 
                                    Electronic Filing, Voice Mail are the reponsibilities of _______________. | 
                            
| A. | ffice Automation System | 
| B. | ransaction Processing System | 
| C. | xpert System | 
| D. | xecutive Support System | 
| Answer» B. ransaction Processing System | |
| 177. | 
                                    In database handling ____ reports used by software for data. | 
                            
| A. | ondition | 
| B. | pecific | 
| C. | eriodic | 
| D. | emand | 
| Answer» D. emand | |
| 178. | 
                                    ECS means ___________________. | 
                            
| A. | nterprise Collaboration System | 
| B. | conomical Calculation Service | 
| C. | nterprise Communication System | 
| D. | conomical Communication Service | 
| Answer» B. conomical Calculation Service | |
| 179. | 
                                    In a firm the reports are generated under condition are called _____ reports. | 
                            
| A. | xception | 
| B. | ondition | 
| C. | tandard | 
| D. | eriodic | 
| Answer» B. ondition | |
| 180. | 
                                    Managers can receive information from _____ that supports their decision making systems. | 
                            
| A. | orkstations | 
| B. | ersonal system | 
| C. | eports | 
| D. | ile | 
| Answer» B. ersonal system | |
| 181. | 
                                    ___ models to analysis a problem and provides possible solution for management evaluation | 
                            
| A. | ecision | 
| B. | tandard | 
| C. | tructural | 
| D. | eriodic | 
| Answer» B. tandard | |
| 182. | 
                                    The most advanced graphics software in any system used by management is normally found in __________________. | 
                            
| A. | PS | 
| B. | SS | 
| C. | ntranets | 
| D. | nterprise systems | 
| Answer» C. ntranets | |
| 183. | 
                                    The operating decisions resulting actions usually cover ____ periods. | 
                            
| A. | edium | 
| B. | hort time | 
| C. | ver an year | 
| D. | ong time | 
| Answer» C. ver an year | |
| 184. | 
                                    An ________________ system has a stored knowledge base and an inference engine. | 
                            
| A. | xpert | 
| B. | enters | 
| C. | ontrol | 
| D. | IS | 
| Answer» B. enters | |
| 185. | 
                                    In any real time system ___ factors are termed as boundaries of the system. | 
                            
| A. | tatement | 
| B. | onditions | 
| C. | locks | 
| D. | imit | 
| Answer» E. | |
| 186. | 
                                    MIS can provide ______________. | 
                            
| A. | ast information | 
| B. | resent information | 
| C. | uture information | 
| D. | ll of the above | 
| Answer» E. | |
| 187. | 
                                    ________________ is a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software. | 
                            
| A. | acking | 
| B. | omputer Crime | 
| C. | rojan Horse | 
| D. | niffer | 
| Answer» D. niffer | |
| 188. | 
                                    In general the information system can also describe in terms of ____. | 
                            
| A. | perations | 
| B. | unctions | 
| C. | vents | 
| D. | asks | 
| Answer» C. vents | |
| 189. | 
                                    _____________________ is unauthorized use, access, modification, and destruction of hardware, software, data, or network resources | 
                            
| A. | acking | 
| B. | omputer Crime | 
| C. | poofing | 
| D. | niffer | 
| Answer» C. poofing | |
| 190. | 
                                    In overall business side the MIS planning initiates from business _____. | 
                            
| A. | ask | 
| B. | vent | 
| C. | lanning | 
| D. | perations | 
| Answer» D. perations | |
| 191. | 
                                    An instruction in a computer program that triggers a malicious act is called as ____________. | 
                            
| A. | ogic Bombs | 
| B. | acket Sniffer | 
| C. | acking | 
| D. | omputer Crime | 
| Answer» B. acket Sniffer | |
| 192. | 
                                    ___ sub system covers granting of credit and cost management | 
                            
| A. | ccounting | 
| B. | urchase | 
| C. | ersonnel | 
| D. | ales | 
| Answer» B. urchase | |
| 193. | 
                                    _____________ is a distinct program that can run unaided. | 
                            
| A. | orm | 
| B. | irus | 
| C. | niffer | 
| D. | poofing | 
| Answer» B. irus | |
| 194. | 
                                    _______ takes responsibility and keeps track of progress in MIS design. Development and implementation. | 
                            
| A. | ime remainder | 
| B. | eriods | 
| C. | llocation | 
| D. | cheduling | 
| Answer» E. | |
| 195. | 
                                    ________________ is a program code that cannot work without being inserted into another program. | 
                            
| A. | orm | 
| B. | irus | 
| C. | niffer | 
| D. | poofing | 
| Answer» C. niffer | |
| 196. | 
                                    ______ type of printer function like a photocopying | 
                            
| A. | nk-Jet | 
| B. | ot matrix | 
| C. | erographic | 
| D. | aser | 
| Answer» D. aser | |
| 197. | 
                                    ______ type of printer is good for text, but not for images | 
                            
| A. | aisy wheel | 
| B. | ot matrix | 
| C. | aser | 
| D. | nk-Jet | 
| Answer» B. ot matrix | |
| 198. | 
                                    The _____ most common form of visual output for user interface | 
                            
| A. | -data | 
| B. | rintout | 
| C. | ail data | 
| D. | can data | 
| Answer» C. ail data | |
| 199. | 
                                    The growth of corporate intranets, extranets, as well as the web, has accelerated the development and use of executive class information delivery and decision support software tools by lower levels of management and by individuals and teams of business professionals. This dramatic expansion has opened the door to the use of which of the following tool? | 
                            
| A. | usiness Intelligence(BI) | 
| B. | usiness Knowledge (BK) | 
| C. | usiness Ideas (BI) | 
| D. | usiness Intelligent(BI) | 
| Answer» B. usiness Knowledge (BK) | |
| 200. | 
                                    ________________ is obsessive use of a computer or unauthorized access and use of computer systems. | 
                            
| A. | acking | 
| B. | omputer Crime | 
| C. | rojan Horse | 
| D. | acket Sniffer | 
| Answer» B. omputer Crime | |