Explore topic-wise MCQs in General Management.

This section includes 600 Mcqs, each offering curated multiple-choice questions to sharpen your General Management knowledge and support exam preparation. Choose a topic below to get started.

201.

________ steps ensure the success of the new systems

A. nitial
B. mplementation
C. esting
D. esign
Answer» C. esting
202.

______ type of feasibility deals with the costs of both development and operations of the system.

A. conomic
B. otivational
C. echnical
D. chedule
Answer» B. otivational
203.

_____ duplex transmission can flow data in two ways but one direction at a time.

A. ull
B. witch
C. alf
D. ircuit
Answer» D. ircuit
204.

Which of the following consists of all the hardware and software that a firm needs to achieve its business objectives?

A. atabase technology
B. etworking technology
C. torage technology
D. nformation technology
Answer» E.
205.

Medium bans channels use ____ type of cables used for transmissions.

A. hielded twisted pair
B. nshielded twisted pair
C. ibre optics
D. o-axial
Answer» B. nshielded twisted pair
206.

Which type of system tracks day-to-day activities of an organization?

A. ransaction processing system (TPS)
B. anagement information system (MIS)
C. ecision-support system (DSS)
D. xecutive support system (ESS)
Answer» B. anagement information system (MIS)
207.

_______is (are) the important component(s) of DSS.

A. ialogue Management
B. odel Management
C. odel Management
D. ll the above
Answer» E.
208.

The system is an orderly grouping of various components linked together to reach ______.

A. profit state
B. specific objective
C. anagers objective
D. arget
Answer» C. anagers objective
209.

Where, when and how to apply knowledge is referred as __________________.

A. isdom
B. nformation
C. ata
D. nowledge
Answer» B. nformation
210.

In network while transferring the data, whole is divided in to _____.

A. ackets
B. locks
C. mall units
D. ata
Answer» B. locks
211.

Determining whether reliable hardware and software required by a proposed system is available or can be acquired by the computer using organization is called___________.

A. ost/benefit analysis
B. conomic feasibility
C. perational feasibility
D. echnical feasibility
Answer» E.
212.

_____ is a device that makes pen and ink drawings of lines, curves and shapes.

A. ight pen
B. ouse
C. eyboard
D. lotters
Answer» E.
213.

ESS and GDSS are mostly used by ____________.

A. enior Executive
B. iddle Managers
C. perational Managers
D. ata Workers
Answer» B. iddle Managers
214.

_______ is small figures that look like a file folder appears in the screen.

A. older
B. cons
C. ile
D. ursor
Answer» C. ile
215.

In database, table is made of _______.

A. ields and records
B. ata and information
C. ell and borders
D. ext and images
Answer» B. ata and information
216.

Prototyping replaces unplanned work with _______________.

A. nd-user practices
B. ystem analysis
C. ard-copy analysis
D. lanned iteration
Answer» E.
217.

Data encryption concept is used for ______ purposes.

A. ata hidden
B. ata display
C. ata processing
D. ata transfer
Answer» E.
218.

Developing Products, Services, or Process that give a Company a Superior Business Position is termed as _________________.

A. onopoly
B. op Performance
C. roductivity
D. ompetitive Advantage
Answer» E.
219.

In communication ______ controls the input and output activities

A. oftware
B. ardware
C. ignals
D. ata
Answer» B. ardware
220.

A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process is _______________.

A. ystem initiation
B. ystem implementation
C. ystem analysis
D. ystem design
Answer» E.
221.

The ______ is monitors the activities of the computer system

A. rocessor
B. AM
C. OM
D. perating system
Answer» E.
222.

The person who ensures that systems are developed on time, within budget, and with acceptable quality is a __________________.

A. ystem designer
B. roject manager
C. ystems owner
D. xternal system user
Answer» C. ystems owner
223.

_____ software describes the programs that are written for users system.

A. ystem
B. pplication
C. eneralized
D. pecific
Answer» C. eneralized
224.

The system software are also called _______.

A. ackage
B. ystem Software
C. tilities
D. pplication Software
Answer» C. tilities
225.

Which one of the following is not one of the major dimensions for developing international information systems architecture?.

A. orporate global strategies
B. rganization structure
C. anagement and business processes
D. usiness process reengineering
Answer» E.
226.

GUI stands for _______

A. raphical User Interface
B. raphical User Interactive
C. raphical User Integration
D. raphical User Inference
Answer» B. raphical User Interactive
227.

Restructuring & transforming a business process by a rethinking and redesign done by ____________.

A. IS
B. nd-Users
C. PR Process
D. educed rate of growth in expenses
Answer» D. educed rate of growth in expenses
228.

A decision support system, which provides support for decision making by a group of persons is __________.

A. SSB
B. he firm's existing MIS
C. DSS
D. ardware components
Answer» D. ardware components
229.

In the Financial Decision-Making System which of the following is not a transaction processing system input _____________.

A. ash receipts
B. ash returns
C. ash issues
D. arehouse requisition slip
Answer» E.
230.

Assembly language use _______ technology for programming

A. ymbols
B. ata
C. nemonic codes
D. lpha numeric
Answer» D. lpha numeric
231.

Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks best describes a(n) ______________.

A. ntruder detection system
B. irewall
C. yber checkpoint
D. yberwall
Answer» C. yber checkpoint
232.

Google are using information technology to pursue this generic strategy of ____________.

A. ow-cost leadership
B. roduct differentiation
C. ocus on market niche
D. trengthening customer and supplier intimacy
Answer» C. ocus on market niche
233.

The ________ has no pre-established decision procedures.

A. nstructured
B. tructured
C. tandard
D. table
Answer» B. tructured
234.

In very big network the ______device is used to find the effective part in time.

A. outer
B. odem
C. ontrol
D. ub
Answer» B. odem
235.

Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________.

A. hishing
B. harming
C. vil twin
D. pamming
Answer» B. harming
236.

________ system uses the condition concept for processing.

A. bject based
B. ule based
C. rame based
D. ase based
Answer» D. ase based
237.

Common threats against information systems come from all of the following factors except ___________________.

A. echnical
B. rganizational
C. overnmental
D. nvironmental
Answer» D. nvironmental
238.

_________ will produce the periodic financial statements and reports of the business.

A. ash ledger
B. inal Account
C. rail Balance
D. eneral Ledger
Answer» E.
239.

The main characteristics of Knowledge Process Outsourcing are___________.

A. rocess are not easily codified
B. he agent has to interpret the information
C. he agent is expected to exercise judgement
D. ll of the above
Answer» E.
240.

________ keeps tracks of data concerning purchase from and payments to suppliers.

A. nventory control
B. ccounts payable
C. ayroll
D. ccounts receivable
Answer» C. ayroll
241.

The MIS should be developed by____________.

A. he manager
B. he information specialist
C. oth (a) and (b)
D. either (a) or (b)
Answer» D. either (a) or (b)
242.

A network of organizations used for procuring raw materials, transforming these materials into products, and distributing the products to customers is called _____________________.

A. alue chain
B. upply chain
C. nterprise system
D. rocess chain
Answer» C. nterprise system
243.

______ type of cables need minimum numbers of repeaters

A. ibre optic
B. o-axial
C. wisted pair
D. ead wire
Answer» B. o-axial
244.

This type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender is _________________.

A. igital signature
B. ymmetric key encryption
C. ublic key encryption
D. igital certificate
Answer» B. ymmetric key encryption
245.

_______ type of cables uses the copper wire for data transmission

A. ibre optics
B. o-axial
C. ead wire
D. wisted pair
Answer» E.
246.

In networks can be classified by their shape are called _____.

A. opology
B. tructure
C. lans
D. rchitecture
Answer» B. tructure
247.

E-commerce is ubiquitous it reduces __________.

A. arketspace
B. ransaction costs
C. ynamic pricing
D. rice discrimination
Answer» C. ynamic pricing
248.

In network the different communication are interconnected by using a communication processors called a _____.

A. rotocols
B. ateway
C. ultiplexers
D. outer
Answer» C. ultiplexers
249.

A method of interacting with customers such as a Web site or a wireless device is called _____________.

A. emand point
B. ustomer service model
C. ales force point
D. ouch point
Answer» E.
250.

In network the term protocols means ____.

A. rocedures
B. onditions
C. lgorithms
D. ules and regulations
Answer» E.