Example: tourism industry

LIST OF ATTEMPTED QUESTIONS AND ANSWERS-MIS

LIST OF ATTEMPTED QUESTIONS AND ANSWERSM ultiple Choice Multiple AnswerQuestionFollowing are Object-oriented languagesCorrect AnswerObject-based Programming Languages , Object-orientedProgramming LanguagesYour AnswerObject-oriented Programming LanguagesSelect The BlankQuestion_____ system is rigid and not amenable to AnswerCloseYour AnswerDeterministicSelect The BlankQuestionIn the hierarchical model within each record data elements areorganized into pieces of records AnswersegmentsYour AnswersegmentsMultiple Choice Single AnswerQuestionInternet connections should be protected byCorrect AnswerfirewallYour AnswerfirewallMultiple Choice Multiple AnswerQuestionSome of the policies / measures that needs to be addressed incase of avoiding internal security threats areCorrect Answerpasswords , special privilege IDs.

The rules that govern how a network is setup is called its Topology BSP Business Systems Planning Some of the major components that composes DSS are hardware , user system interface , database and its management Information requirement within organization are …

Tags:

  Rules, Information, Question, Management, Topology, Management information

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of LIST OF ATTEMPTED QUESTIONS AND ANSWERS-MIS

1 LIST OF ATTEMPTED QUESTIONS AND ANSWERSM ultiple Choice Multiple AnswerQuestionFollowing are Object-oriented languagesCorrect AnswerObject-based Programming Languages , Object-orientedProgramming LanguagesYour AnswerObject-oriented Programming LanguagesSelect The BlankQuestion_____ system is rigid and not amenable to AnswerCloseYour AnswerDeterministicSelect The BlankQuestionIn the hierarchical model within each record data elements areorganized into pieces of records AnswersegmentsYour AnswersegmentsMultiple Choice Single AnswerQuestionInternet connections should be protected byCorrect AnswerfirewallYour AnswerfirewallMultiple Choice Multiple AnswerQuestionSome of the policies / measures that needs to be addressed incase of avoiding internal security threats areCorrect Answerpasswords , special privilege IDs.

2 Authorization levelsYour Answerspecial privilege IDs , authorization levelsMultiple Choice Single AnswerQuestionMIS always refers toCorrect AnswerComputer system and manual AnswerComputer system and manual Choice Single AnswerQuestionThink globally and Act locally' is a key to successfulimplementation to one of the following;QuestionThe increased business complexities could be attributed totechnological changes , explosion of information , research and developmentInformation is a resource becauseit is scarce , it has cost , it has alternate usesData and storage instructions are stored for temporary period till processing is completed hereprimary storageThe business organization is normally designed in apyramid structureMIS as a function should be flexible enough to respond tochanging environmentA combination of human and computer based resources which result in collection and use of data for purpose of efficient management and business planningmarketing information systemManufacturing as a functional sub - system will have the following functionsCost control analysis.

3 , Sales forecasts. , Sales is the short form ofFixed Asset Asset of the following is a required field in the Debit noteInward are the types of Payment GenerationVoucher Generation , Bank Payment Voucher GenerationVoucher Generation , Bank Payment Voucher GenerationThe user department sends the indent directly to the purchase _____ gives Transaction details to Account Payable SystemJournalOne of the following is the front end application in hospital industrypatient database , linked database , medical case history databaseThe returns in the manufacturing sector are immediate as compared to the service choice of technology makes a significant difference in the service quality to the computer hardware consists ofCentral processing unit.

4 , Primary and secondary of the input devices are as underTouch screen. , Computer mouse. , disk is a primary storage second generation of computers used integrated following principle of decision making technique refers to taking a number of decisions based on its own logic Logic and is the short form ofBusiness Systems could be divided into following two categoriesProgrammed. , Non techniques used for non programmed decisions areJudgment. , Intuition. , Business trees could be represented in different ways such asBottom to top. , Left to right. , Top to - Means analysis is a technique used for determining information requirement of the organization at department or individual mangers science of communication and control is known as can communicate with each other throughFunctionsConversion is possible only after the following procedures are completeTesting , File building , User trainingIn OOP inheritance refers to the ability to take more than one Support SystemIs a non-flexible systemSome of the tools of Expert Systems areWAX , Expert EaseEIS facilitates access from many places.

5 This enables to address adhoc queries. This is provides access to historical data. This is free idea generation is a factor information contained in the data dictionary isName of data item. , Source of data. , KeywordDatabase is pivotal unknown associates is result of one of the following:Data MiningStructure of data inside the data warehouse consists of one of the following:Current detail dataData Mining is information _____ Mining is also known as _____ DiscoveryUnauthorized reading of data comes under one of the following: information BreachDSS provides withraw data and status access , general analysis capabilities , representation models_____ is a _____ of data organized to service many users at the same IT and business units must be involved in the data warehouse project for its successTRUEThe rules that govern how a network is setup is called itsTopologyBSPB usiness Systems PlanningSome of the major components that composes DSS arehardware , user system interface.

6 Database and its managementInformation requirement within organization aredifferentThis OS can provide mainframe-like computer power for new applications with massive memory and file Windows NTData Miningall of the aboveEIS /ESS cannot utilize hypertext and hypermediaFALSEIt is the non-trivial extraction of implicit, previously unknown and potentially useful information from the dataoptions b and c_____ consists of _____, which enable end-users and programmers to extract data from _____ decides which computer resource will be used, which programs will be run and the _____ in which activities will take systemsequence_____ competition has increased _____ and these standards are not standardsIDs that have not been used in a predefined period of time should be disabledTRUEThe different types of models used by DSS areOperations research model , Behavioral model , management science model_____provides a generalized computing and telecommunications capacity that can be applied to a changing EISMIS need not be compatible with the organizations structure and facilitates aggregated and context data.

7 This is control system should be definite and determinable. This is done under one of the interactive information systems that rely on an integrated set of user friendly hardware and DSSOne of the following is the decision tool that helps in summarizing the interactions of various alternative actions of Pay off systems lack human self-awareness and self analysis enables to address adhoc queries. This is of GDSS are as followsAutomated record keeping , Parallel communication , Anonymous inputsThe_____is the component of communication to which information is transferredReceiverThe primary goal of one of the following system is to obtain data from a variety of sources, integrate and aggregate the data and display resultsESSData Warehousing is seen as a Data Arrangement technology adopting one of the following:Up-date approachThe Competitor Master Entry Screen consists of NameData Mining is information _____ could be divided into following two categoriesProgrammed.

8 , Non product assurance discipline of the discipline triangle will includequality assurance , test and evaluation , configuration managementClasses are user defined data warehouse is organized according to IDE was developed by GE under the leadership of Charles data warehouse typically starts with one of the following type of database:Very largeTrained facilitator is a_____of is the short form ofArtificial of the following consumes shelf space, has a shelf life and has a physical unit of measureproductThe characteristics of EIS / ESS areInformation characteristics , User-interface / orientation characteristics , Managerial executive characteristicsCriticism free idea generation is a factor , train and _____ the employees to work for the customers is a principle stated by Tom Peters in "The EmpowerThe strategy formulation and implementation depends a lot on the information onsocio-economic changes , new demands arising out of these changes , changing technologyThe software quality capabilities ensure that software is.

9 Reliable , doing what it is supposed to do , doing efficientlyData dictionary is the 3rd component of the of the following sub-systems of the dialogue management component of the DSS programs checks the user commands for correct interfaceESS/ EIS is normally developed to assist the operation level decision management components of DSS program is a set of programs that manages user Stock Value details are given to _____ by KardexAccountsIf the central hub in star topology breaks down thenThe network stops of system which is practical, specific and operational is one of the and machine are types of marketing service system will provide the facility of re-opening enquiries received from distributors or TRUESome of the advantages of prototyping areTrying out ideas without incurring large costs , Reduced application development time , Reduced maintenanceThe different forms of authorization for access of database areread authorization , index authorization , update index authorizationOne of the following is a core application of Back OfficeHospital billing and recoveryFollowing are the components of communicationSender.

10 , Receiver. , tools canGive standardization based on single method , Generate data modelsFor arriving at the CSF the technique usually used isPersonal miningIs an information analysis tool that evolves the automated discovery of patterns and relationships in a data warehouse. , Encompasses a number of technical approaches such as clustering, data summarization . , Is the process of discovering meaningful, new correlation patterns and of the following person's signature is required on the "Goods Receipt Note"Stores functions of the data dictionary areIt defines data elements. , It permits users to know which data is available. , It helps in scheduling and the component of communication through which information is commands received from the_____management components are delivered either to the model base management system or the mode execution connections should be protected byfirewallOne byte is made ofEight weakness of pay off matrix is that itDepends on decision makers of the following is the first component of DBMSDDLF ollowing statements are true with the ALUA rithmetic processing is done by it.


Related search queries