Explore topic-wise MCQs in General Management.

This section includes 600 Mcqs, each offering curated multiple-choice questions to sharpen your General Management knowledge and support exam preparation. Choose a topic below to get started.

301.

*$_In communication ______ that controls the input and output activities?

A. Software
B. Hardware
C. Signals
D. Data
Answer» B. Hardware
302.

*$_In database, table is made of _______.?

A. fields and records
B. data and information
C. cell and borders
D. text and images
Answer» B. data and information
303.

*$_Determining whether reliable hardware and software required by a proposed system is available or can be acquired by the computer using organization is called___________.?

A. Cost/benefit analysis
B. Economic feasibility
C. Operational feasibility
D. Technical feasibility
Answer» E.
304.

*$______ duplex transmission can flow data in two ways but one direction at a time.?

A. Full
B. Switch
C. Half
D. Circuit
Answer» D. Circuit
305.

*$________is (are) the important component(s) of DSS.?

A. Dialogue Management
B. Model Management
C. Model Management
D. All the above
Answer» E.
306.

*/*_Tracking employee training, skills, and performance appraisal is an example of a human resource information system operating at the ____________________.?

A. Operational level
B. Management level
C. Knowledge level
D. Strategic level
Answer» B. Management level
307.

*/*_____ means that information must reach the recipients within the prescribe timerframe.?

A. Duration
B. Period
C. Timeliness
D. Time
Answer» D. Time
308.

*/*_In which of the following functions of MIS reports are generated based on the enterprise's need ______________.?

A. Planning
B. Prediction
C. Data Processing
D. Data storage
Answer» B. Prediction
309.

*/*______ is the fact that are properly arranged, classified and organized.?

A. Data
B. Events
C. Statements
D. Information
Answer» E.
310.

*/*_The Management information System receives input from the _____________.?

A. EIS
B. ES
C. DSS
D. TPS
Answer» E.
311.

*/*_The emerging class of applications focuses on personalized decision support, modeling, information retrieval, data warehousing, what-if scenarios and reporting is called __________________.?

A. Decision Support Trends
B. Decision Support History
C. Decision Support models
D. Decision Support class
Answer» B. Decision Support History
312.

*/*_In which of the following types of analysis, the goal is to find the optimum value for one or more target variables, given certain constraints??

A. what if analysis
B. optimization
C. Goal seeking analysis
D. None of these
Answer» C. Goal seeking analysis
313.

*/*_Which one of the following is used for evaluating credit risks??

A. Virtual Reality
B. Neural Network
C. Fuzzy logic
D. None of the above
Answer» C. Fuzzy logic
314.

*/*_GB in memory stands for _____.?

A. Giga Bytes
B. Giga Bits
C. Gif Bits
D. Gif Bytes
Answer» B. Giga Bits
315.

*/*_Program testing concept use ________ approaches?

A. Sequence
B. Parallel
C. top-down
D. bottom-up
Answer» D. bottom-up
316.

*/*_In database handling ____ reports used by software for data.?

A. Condition
B. Specific
C. Periodic
D. Demand
Answer» D. Demand
317.

*/*_The analysis and design of application systems are the responsibility of a ___________.?

A. Computer Operator
B. Programmer
C. System Analyst
D. Data entry operator
Answer» D. Data entry operator
318.

*/*____ models to analysis a problem and provides possible solution for management evaluation?

A. Decision
B. Standard
C. Structural
D. Periodic
Answer» B. Standard
319.

*/*_An ________________ system has a stored knowledge base and an inference engine.?

A. Expert
B. Centers
C. Control
D. MIS
Answer» B. Centers
320.

*/*_In overall business side the MIS planning initiates from business _____.?

A. Task
B. Event
C. Planning
D. Operations
Answer» D. Operations
321.

*/*_________________ is a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software.?

A. Hacking
B. Computer Crime
C. Trojan Horse
D. Sniffer
Answer» D. Sniffer
322.

*/*_________________ is obsessive use of a computer or unauthorized access and use of computer systems.?

A. Hacking
B. Computer Crime
C. Trojan Horse
D. Packet Sniffer
Answer» B. Computer Crime
323.

*/*______________ is a distinct program that can run unaided.?

A. Worm
B. Virus
C. Sniffer
D. Spoofing
Answer» B. Virus
324.

*/*_____ information system that express a fundamental concept and activities of information systems.?

A. Model
B. Style
C. Standard
D. Logic
Answer» B. Style
325.

*/*_A computer security protocol for logging in would be an example of the component of an information system ____________.?

A. Software
B. Hardware
C. Data
D. Procedure
Answer» E.
326.

*/*_The computer system uses _____ forms of data for usage.?

A. Symbols
B. Analog
C. Digital
D. Text
Answer» D. Text
327.

*/*____________ is the process of defining the current problem, determining why a new system is needed, identifying the objectives of the proposed system:?

A. Feasibility analysis
B. System Analysis
C. System definition
D. System requirements
Answer» D. System requirements
328.

*/*_____ type of data uses pictures and graphics shapes for usage.?

A. Text
B. Image
C. Alpha numeric
D. Symbols
Answer» C. Alpha numeric
329.

*/*_Which is not a domain of Artificial Intelligence??

A. Intelligent Agents
B. Expert System
C. None of the above
D. Both A & B
Answer» E.
330.

*/*_POS stands for ____.?

A. Point Of Structure
B. Point Of Sale
C. Product Of Structure
D. Product Of Sale
Answer» C. Product Of Structure
331.

*/*_Petroleum refining, power generation and steel production systems are example of ____________ systems.?

A. Transaction Processing
B. Process Control
C. Enterprise Collaboration
D. Management Information
Answer» C. Enterprise Collaboration
332.

*/*_The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver is called _________________.?

A. Demodulation
B. Filtering
C. Encryption
D. Stateful inspection
Answer» D. Stateful inspection
333.

*/*_____ system that allocate costs to users based on the information services rendered?

A. change complete
B. change back
C. charge complete
D. charge back
Answer» E.
334.

*/*_Decision trees could be represented in different ways such as ____________________.?

A. Bottom to top
B. Left to right
C. Top to bottom
D. All of the above
Answer» E.
335.

*/*_____ information system planning us the last stage of the planning process.?

A. Tactical
B. Strategic
C. Architecture
D. Processed
Answer» B. Strategic
336.

*/*_The flow of information through MIS is ______________.?

A. Need dependent
B. Organization dependent
C. Information dependent
D. Management dependent
Answer» B. Organization dependent
337.

*/*_________ language use for artificial intelligence and symbolic applications?

A. LISP
B. C
C. PROLOG
D. PASCAL
Answer» B. C
338.

*/*_The main characteristics of Knowledge Process Outsourcing are___________.?

A. Process are not easily codified
B. The agent has to interpret the information
C. The agent is expected to exercise judgement
D. All of the above
Answer» E.
339.

*/*_FIFO stands for ______.?

A. First Interactive First Out
B. First In First Out
C. First Invented First Out
D. First Interface First Out
Answer» C. First Invented First Out
340.

*/*_Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________.?

A. Phishing
B. Pharming
C. Evil twin
D. Spamming
Answer» B. Pharming
341.

*/*_Which one of the following is not one of the major dimensions for developing international information systems architecture?.?

A. Corporate global strategies
B. Organization structure
C. Management and business processes
D. Business process reengineering
Answer» E.
342.

*/*_______ type of cables need minimum numbers of repeaters?

A. Fibre optic
B. Co-axial
C. Twisted pair
D. Lead wire
Answer» B. Co-axial
343.

*/*_E-commerce is ubiquitous it reduces __________.?

A. Marketspace
B. Transaction costs
C. Dynamic pricing
D. Price discrimination
Answer» C. Dynamic pricing
344.

*/*_In network the term protocols means ____.?

A. Procedures
B. Conditions
C. Algorithms
D. Rules and regulations
Answer» E.
345.

*/*_____ system is concerned with the way information is used for purpose of control and applies technologies.?

A. Feedback
B. Interview
C. Interaction
D. Conference
Answer» B. Interview
346.

*/*_A combination of a MIS and DSS called _____________ which helps top managers make decisions.?

A. GIS
B. EIS
C. EPI
D. CAM
Answer» C. EPI
347.

*/*_The information generated at regular intervals is a _____ information.?

A. depositing
B. saving
C. recurring
D. collecting
Answer» D. collecting
348.

*/*_Management information systems usually______________.?

A. Serve managers interested in weekly, monthly, and yearly results, not day-to-day activities
B. Help managers make decisions that are unique, rapidly changing, and not easily specified in advance
C. Provide managers with a generalised computing and telecommunications capacity that can be applied to a changing array of problems
D. Perform and record the daily routine transactions necessary to the conduct of business
Answer» B. Help managers make decisions that are unique, rapidly changing, and not easily specified in advance
349.

*/*_Plan must include the _____ systems concept for implementation of the new Information system.?

A. Existing
B. Future
C. Omitted
D. Progressing
Answer» B. Future
350.

*/*_The advantages of creating a prototype are ____________________.?

A. It allows developers to experiment with number of different design options
B. It can serve as means of communication between developers and customers
C. Both (a) and (b)
D. None of the above
Answer» D. None of the above