MCQOPTIONS
 Saved Bookmarks
				This section includes 600 Mcqs, each offering curated multiple-choice questions to sharpen your General Management knowledge and support exam preparation. Choose a topic below to get started.
| 201. | 
                                    ________ steps ensure the success of the new systems | 
                            
| A. | nitial | 
| B. | mplementation | 
| C. | esting | 
| D. | esign | 
| Answer» C. esting | |
| 202. | 
                                    ______ type of feasibility deals with the costs of both development and operations of the system. | 
                            
| A. | conomic | 
| B. | otivational | 
| C. | echnical | 
| D. | chedule | 
| Answer» B. otivational | |
| 203. | 
                                    _____ duplex transmission can flow data in two ways but one direction at a time. | 
                            
| A. | ull | 
| B. | witch | 
| C. | alf | 
| D. | ircuit | 
| Answer» D. ircuit | |
| 204. | 
                                    Which of the following consists of all the hardware and software that a firm needs to achieve its business objectives? | 
                            
| A. | atabase technology | 
| B. | etworking technology | 
| C. | torage technology | 
| D. | nformation technology | 
| Answer» E. | |
| 205. | 
                                    Medium bans channels use ____ type of cables used for transmissions. | 
                            
| A. | hielded twisted pair | 
| B. | nshielded twisted pair | 
| C. | ibre optics | 
| D. | o-axial | 
| Answer» B. nshielded twisted pair | |
| 206. | 
                                    Which type of system tracks day-to-day activities of an organization? | 
                            
| A. | ransaction processing system (TPS) | 
| B. | anagement information system (MIS) | 
| C. | ecision-support system (DSS) | 
| D. | xecutive support system (ESS) | 
| Answer» B. anagement information system (MIS) | |
| 207. | 
                                    _______is (are) the important component(s) of DSS. | 
                            
| A. | ialogue Management | 
| B. | odel Management | 
| C. | odel Management | 
| D. | ll the above | 
| Answer» E. | |
| 208. | 
                                    The system is an orderly grouping of various components linked together to reach ______. | 
                            
| A. | profit state | 
| B. | specific objective | 
| C. | anagers objective | 
| D. | arget | 
| Answer» C. anagers objective | |
| 209. | 
                                    Where, when and how to apply knowledge is referred as __________________. | 
                            
| A. | isdom | 
| B. | nformation | 
| C. | ata | 
| D. | nowledge | 
| Answer» B. nformation | |
| 210. | 
                                    In network while transferring the data, whole is divided in to _____. | 
                            
| A. | ackets | 
| B. | locks | 
| C. | mall units | 
| D. | ata | 
| Answer» B. locks | |
| 211. | 
                                    Determining whether reliable hardware and software required by a proposed system is available or can be acquired by the computer using organization is called___________. | 
                            
| A. | ost/benefit analysis | 
| B. | conomic feasibility | 
| C. | perational feasibility | 
| D. | echnical feasibility | 
| Answer» E. | |
| 212. | 
                                    _____ is a device that makes pen and ink drawings of lines, curves and shapes. | 
                            
| A. | ight pen | 
| B. | ouse | 
| C. | eyboard | 
| D. | lotters | 
| Answer» E. | |
| 213. | 
                                    ESS and GDSS are mostly used by ____________. | 
                            
| A. | enior Executive | 
| B. | iddle Managers | 
| C. | perational Managers | 
| D. | ata Workers | 
| Answer» B. iddle Managers | |
| 214. | 
                                    _______ is small figures that look like a file folder appears in the screen. | 
                            
| A. | older | 
| B. | cons | 
| C. | ile | 
| D. | ursor | 
| Answer» C. ile | |
| 215. | 
                                    In database, table is made of _______. | 
                            
| A. | ields and records | 
| B. | ata and information | 
| C. | ell and borders | 
| D. | ext and images | 
| Answer» B. ata and information | |
| 216. | 
                                    Prototyping replaces unplanned work with _______________. | 
                            
| A. | nd-user practices | 
| B. | ystem analysis | 
| C. | ard-copy analysis | 
| D. | lanned iteration | 
| Answer» E. | |
| 217. | 
                                    Data encryption concept is used for ______ purposes. | 
                            
| A. | ata hidden | 
| B. | ata display | 
| C. | ata processing | 
| D. | ata transfer | 
| Answer» E. | |
| 218. | 
                                    Developing Products, Services, or Process that give a Company a Superior Business Position is termed as _________________. | 
                            
| A. | onopoly | 
| B. | op Performance | 
| C. | roductivity | 
| D. | ompetitive Advantage | 
| Answer» E. | |
| 219. | 
                                    In communication ______ controls the input and output activities | 
                            
| A. | oftware | 
| B. | ardware | 
| C. | ignals | 
| D. | ata | 
| Answer» B. ardware | |
| 220. | 
                                    A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process is _______________. | 
                            
| A. | ystem initiation | 
| B. | ystem implementation | 
| C. | ystem analysis | 
| D. | ystem design | 
| Answer» E. | |
| 221. | 
                                    The ______ is monitors the activities of the computer system | 
                            
| A. | rocessor | 
| B. | AM | 
| C. | OM | 
| D. | perating system | 
| Answer» E. | |
| 222. | 
                                    The person who ensures that systems are developed on time, within budget, and with acceptable quality is a __________________. | 
                            
| A. | ystem designer | 
| B. | roject manager | 
| C. | ystems owner | 
| D. | xternal system user | 
| Answer» C. ystems owner | |
| 223. | 
                                    _____ software describes the programs that are written for users system. | 
                            
| A. | ystem | 
| B. | pplication | 
| C. | eneralized | 
| D. | pecific | 
| Answer» C. eneralized | |
| 224. | 
                                    The system software are also called _______. | 
                            
| A. | ackage | 
| B. | ystem Software | 
| C. | tilities | 
| D. | pplication Software | 
| Answer» C. tilities | |
| 225. | 
                                    Which one of the following is not one of the major dimensions for developing international information systems architecture?. | 
                            
| A. | orporate global strategies | 
| B. | rganization structure | 
| C. | anagement and business processes | 
| D. | usiness process reengineering | 
| Answer» E. | |
| 226. | 
                                    GUI stands for _______ | 
                            
| A. | raphical User Interface | 
| B. | raphical User Interactive | 
| C. | raphical User Integration | 
| D. | raphical User Inference | 
| Answer» B. raphical User Interactive | |
| 227. | 
                                    Restructuring & transforming a business process by a rethinking and redesign done by ____________. | 
                            
| A. | IS | 
| B. | nd-Users | 
| C. | PR Process | 
| D. | educed rate of growth in expenses | 
| Answer» D. educed rate of growth in expenses | |
| 228. | 
                                    A decision support system, which provides support for decision making by a group of persons is __________. | 
                            
| A. | SSB | 
| B. | he firm's existing MIS | 
| C. | DSS | 
| D. | ardware components | 
| Answer» D. ardware components | |
| 229. | 
                                    In the Financial Decision-Making System which of the following is not a transaction processing system input _____________. | 
                            
| A. | ash receipts | 
| B. | ash returns | 
| C. | ash issues | 
| D. | arehouse requisition slip | 
| Answer» E. | |
| 230. | 
                                    Assembly language use _______ technology for programming | 
                            
| A. | ymbols | 
| B. | ata | 
| C. | nemonic codes | 
| D. | lpha numeric | 
| Answer» D. lpha numeric | |
| 231. | 
                                    Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks best describes a(n) ______________. | 
                            
| A. | ntruder detection system | 
| B. | irewall | 
| C. | yber checkpoint | 
| D. | yberwall | 
| Answer» C. yber checkpoint | |
| 232. | 
                                    Google are using information technology to pursue this generic strategy of ____________. | 
                            
| A. | ow-cost leadership | 
| B. | roduct differentiation | 
| C. | ocus on market niche | 
| D. | trengthening customer and supplier intimacy | 
| Answer» C. ocus on market niche | |
| 233. | 
                                    The ________ has no pre-established decision procedures. | 
                            
| A. | nstructured | 
| B. | tructured | 
| C. | tandard | 
| D. | table | 
| Answer» B. tructured | |
| 234. | 
                                    In very big network the ______device is used to find the effective part in time. | 
                            
| A. | outer | 
| B. | odem | 
| C. | ontrol | 
| D. | ub | 
| Answer» B. odem | |
| 235. | 
                                    Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________. | 
                            
| A. | hishing | 
| B. | harming | 
| C. | vil twin | 
| D. | pamming | 
| Answer» B. harming | |
| 236. | 
                                    ________ system uses the condition concept for processing. | 
                            
| A. | bject based | 
| B. | ule based | 
| C. | rame based | 
| D. | ase based | 
| Answer» D. ase based | |
| 237. | 
                                    Common threats against information systems come from all of the following factors except ___________________. | 
                            
| A. | echnical | 
| B. | rganizational | 
| C. | overnmental | 
| D. | nvironmental | 
| Answer» D. nvironmental | |
| 238. | 
                                    _________ will produce the periodic financial statements and reports of the business. | 
                            
| A. | ash ledger | 
| B. | inal Account | 
| C. | rail Balance | 
| D. | eneral Ledger | 
| Answer» E. | |
| 239. | 
                                    The main characteristics of Knowledge Process Outsourcing are___________. | 
                            
| A. | rocess are not easily codified | 
| B. | he agent has to interpret the information | 
| C. | he agent is expected to exercise judgement | 
| D. | ll of the above | 
| Answer» E. | |
| 240. | 
                                    ________ keeps tracks of data concerning purchase from and payments to suppliers. | 
                            
| A. | nventory control | 
| B. | ccounts payable | 
| C. | ayroll | 
| D. | ccounts receivable | 
| Answer» C. ayroll | |
| 241. | 
                                    The MIS should be developed by____________. | 
                            
| A. | he manager | 
| B. | he information specialist | 
| C. | oth (a) and (b) | 
| D. | either (a) or (b) | 
| Answer» D. either (a) or (b) | |
| 242. | 
                                    A network of organizations used for procuring raw materials, transforming these materials into products, and distributing the products to customers is called _____________________. | 
                            
| A. | alue chain | 
| B. | upply chain | 
| C. | nterprise system | 
| D. | rocess chain | 
| Answer» C. nterprise system | |
| 243. | 
                                    ______ type of cables need minimum numbers of repeaters | 
                            
| A. | ibre optic | 
| B. | o-axial | 
| C. | wisted pair | 
| D. | ead wire | 
| Answer» B. o-axial | |
| 244. | 
                                    This type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender is _________________. | 
                            
| A. | igital signature | 
| B. | ymmetric key encryption | 
| C. | ublic key encryption | 
| D. | igital certificate | 
| Answer» B. ymmetric key encryption | |
| 245. | 
                                    _______ type of cables uses the copper wire for data transmission | 
                            
| A. | ibre optics | 
| B. | o-axial | 
| C. | ead wire | 
| D. | wisted pair | 
| Answer» E. | |
| 246. | 
                                    In networks can be classified by their shape are called _____. | 
                            
| A. | opology | 
| B. | tructure | 
| C. | lans | 
| D. | rchitecture | 
| Answer» B. tructure | |
| 247. | 
                                    E-commerce is ubiquitous it reduces __________. | 
                            
| A. | arketspace | 
| B. | ransaction costs | 
| C. | ynamic pricing | 
| D. | rice discrimination | 
| Answer» C. ynamic pricing | |
| 248. | 
                                    In network the different communication are interconnected by using a communication processors called a _____. | 
                            
| A. | rotocols | 
| B. | ateway | 
| C. | ultiplexers | 
| D. | outer | 
| Answer» C. ultiplexers | |
| 249. | 
                                    A method of interacting with customers such as a Web site or a wireless device is called _____________. | 
                            
| A. | emand point | 
| B. | ustomer service model | 
| C. | ales force point | 
| D. | ouch point | 
| Answer» E. | |
| 250. | 
                                    In network the term protocols means ____. | 
                            
| A. | rocedures | 
| B. | onditions | 
| C. | lgorithms | 
| D. | ules and regulations | 
| Answer» E. | |