ISM MCQs
ISM MCQs
The organisations are linked as nodes on the network where they receive and
transmit information. (True/False)
TRUE
FALSE
x
x
With the current availability of data on the Web, the most important data can
be accessed easily. (True/False)
TRUE
FALSE
x
x
The city government obtains data from the information systems of firms in a
city regarding their employees offices and places of living for promoting
carpooling. This is an example of the _______________ effects of
implementation information systems by the firms.
(a) third order
(b) second order
(c) first order
(d) both (b) and (c)
Though information is processed data, it can be treated as raw data for further
processing. (True/False)
TRUE
FALSE
x
x
The raw data and the information produced from it are stored in software
programs called
(a) Apps
(b) Office suites
(c) Databases
(d) Presentation programs
The data pertaining to which of the following aspects is not useful for the
human resources function of an organisation?
(a) Data about the employees attendance
(b) Data about the employees days of leave
(c) Data about the type of components used in a product
(d) Data about the functions the employees perform
MIS reports prepared in the __________ mode allow managers to drill down
to details.
Batch
Group
Live
Offline
The term ‘bubble’ refers to the dramatic rise in the overall stock prices of
new firms in the USA and India in the late 1990s. (True/ False)
TRUE
FALSE
x
x
In the year 2000, many large investors started selling stocks of many new
overpriced firms. This is referred to as the ‘bust’ of the dotcom bubble.
(True/False)
TRUE
FALSE
x
x
Search engines are built upon ___________ to search information and data
within web pages and categorise them.
HTML
Google
HTTPS
SMTP
After the expiry of the term of the Kyoto Protocol, which amendment has
been proposed as an extension to the Kyoto Protocol?
(a) Kyoto Amendment
(b) New York Amendment
(c) Colombo Amendment
(d) Doha Amendment
Since carbon dioxide remains in the atmosphere for a relatively long
duration, it has the strongest contribution to global warming. (True/ False)
TRUE
FALSE
x
x
Design of IT products can follow green practices and this includes design of
both ________ and _________ .
Hardware, Software
Structure, Surroundings
Buildings, Equipments
Firmware,Software
Algorithms that take the least number of steps to come up with the answer for
a search task are considered energy efficient because they impose a lesser
burden on the processors in the active state.
TRUE
FALSE
x
x
Buffering does not reduce the energy required to read data for an application.
(True/False)
TRUE
FALSE
x
x
The smart city definition, given by the Government of India, and a smart
definition coming from Europe, both emphasise use of IT and
communications infrastructure, sustainability, etc. in smart cities.
(True/False)
TRUE
FALSE
x
x
Sensing “handovers”, that is, movement of phones from one mobile tower to
another, as the phone is moving in the car, does not give a better estimate of
the number of cars moving on the road. (True/False)
TRUE
FALSE
x
x
The maps provided by OpenStreetMap are not publicly available as they are
created and owned by a corporation. (True/False)
TRUE
FALSE
x
x
While dealing with large quantities of data generated by sensors in the green
IT and smart city projects, managers face the challenges of storage,
management, disposal and ______.
Compliance
Integrity
Accuracy
Availability
The issue of ________ has been flagged in cities and countries, where
citizens feel that their everyday activities are being sensed, and the data
generated from these activities is being stored and later analysed.
Privilege
Piracy
Privity
Privacy
With respect to the cost incurred on creating new infrastructure for green IT,
the challenge for managers is to ensure that the benefits from green IT should
exceed the cost incurred.
TRUE
FALSE
x
x
The hype around a technology drops when the media and users realise that
the technology is either not mature enough to enter the market or not as good
as the technology media projected it to be. (True/False)
TRUE
FALSE
x
x
The ________ is the central pathway for transferring data around the
computer.
USB
BUS
3 pin
Data link
Servers are distinguished from ______- , which are computers that demand
and receive services from servers.
Clients
Hub
Networks
Operating Systems
The ______ boots up the computer and takes control of all the components.
Computer
RAM
ROM
Operating Systems
Database applications are not easily ________ and do create a lock-in when
users opt for one.
Interchangeable
Recoverable
Updatable
Bootable
_______ reduces the size of files so that the storage capacity can be used
more efficiently.
Winrar
Winzip
Compression Software
Expansion Software
The RAM speed is an indication of how fast the memory device is able to
read or change its contents.
TRUE
FALSE
x
x
Devices such as flash drives and compact discs are examples of fixed
storage.
TRUE
FALSE
x
x
Tape drives still provide the most cost effective and reliable storage
available. But they are slower than other drives and because of their
sequential reading process, searching data in them is difficult and slow.
TRUE
FALSE
x
x
To view or modify files containing images, music or video data, which type
of software is used?
Multimedia Software
VLC
Media Player
Video Player
Which of the following statements is not true about the instruction cycle and
the execution cycle that are followed in the processor for doing a work?
(a) In the instruction cycle, the data and instructions are fetched from the
external memory, decoded and stored in the registers for running then through the
gates.
(b) In the execution cycle, the instructions and data, which are stored in the
registers, are fed through the gates. The results obtained from the computations,
done by the gates, are stored back in the registers.
(c) The instructions that are acted upon could be related to transferring data
(from one part of the computer to another), arithmetic operations, logical
operations, and control operations that determine a sequence of actions to take.
(d) After the completion of a machine cycle, the processor goes idle for a very
short duration before starting another cycle.
Which of the following statements is not true about desktops and laptops?
(a) The key advantage of desktops is they can be upgraded quite easily, as
there is plenty of space in the CPU units to add or change the components.
(b) Laptops cannot be easily upgraded as the components within them are
packed quite tightly and cannot be easily interchanged or replaced.
(c) Laptops have a smaller renewal cycle as they are more prone to physical
shocks and mechanical wear.
(d) Desktop purchases are usually more expensive than laptops, when
compared feature by feature.
Which of the following statements are true about the storage area network
(SAN)?
(a) A storage area network (SAN) consists of hard disk arrays and is
maintained separately on the network. However, to all the computers on the
network, SAN appears to be an attached disk drive.
(b) SAN enables many users and computers to share the same storage, which
can be effectively backed up and protected centrally.
(c) SAN provides flexibility in scaling up as only the storage unit needs to be
upgraded, not the computer boxes using the storage.
(d) All of the above
Which of the following statements are not true about the operating system
(OS)?
(a) The OS controls all the hardware in computers. It also manages the work
given to the processor, including scheduling and prioritising various tasks.
(b) After the computer boot-up, the OS manages the available memory in
RAM by loading and unloading programs as per the user’s need.
(c) The OS does not manage or run the drivers of any peripheral hardware.
(d) The operating system also manages a user interface, which is graphical in
most modern operating system.
The _______ is a technology that loosens the tight coupling between the
hardware and the operating system.
Virtual Server
VPN
SandBox
Private Machines
Which of the following statements are true about the time and materials
model of IT outsourcing?
(a) In this model, the vendor brings skilled staff and resources, such as
software and computers, to the site of the client to build systems.
(b) The vendor bills the client for the hours spent on the job (per employee)
and the costs of the hardware and software used.
(c) This model is best suited for clients who are not very sure of their
requirements, and need the skills of the vendor to get going on their project.
(d) All of the above
It is not possible to price cloud services according to the usage and needs of
the client.
TRUE
FALSE
x
x
Applications that have large data streams with variety and high rates of
accumulation are not best stored on cloud servers that can accommodate the
scale.
TRUE
FALSE
x
x
In a furnished apartment most of the facilities for living are already available
and the renter can start living there with only her personal effects. This
analogy corresponds to which of the following cloud service models?
(a) SaaS
(b) PaaS
(c) IaaS
(d) None of the above
Match the following cloud service model with their features (a) SaaS model
(b) PaaS model (c) IaaS model (i) Users have access to a number of tools
and packages with which an IT solution can be built and deployed on the
cloud. (ii) Users can install their own application software on the infrastru
(a) (ii) (a) (i) (c) (ii)
(a) (ii) (a) (iii) (c) (i)
(a) (iii) (a) (ii) (c) (i)
(a) (i) (a) (iii) (c) (ii)
Match the following. (a) Community cloud (b) Private cloud (c) Public cloud
(d) Hybrid cloud --> (i) The software that manages this cloud responds to
cloud bursts by provisioning extra resources from the public cloud as
required. (ii) This cloud is a truly shared facility that allows multiple client
(a) (iii), (b) (iv), (c) (ii), (d) (i)
(a) (ii), (b) (iv), (c) (iii), (d) (i)
(a) (iii), (b) (iv), (c) (i), (d) (ii)
(a) (iii), (b) (ii), (c) (iv), (d) (i)
Sensors that are able to filter out redundant data to remove noise from the
analysis are known as ___________
Smart Filters
Smart Servers
Smart Sensors
Smart Systems
Sensors and actuators refer to things in the Internet of Things. (True/ False)
TRUE
FALSE
x
x
NMIMS MCQs - Information System For
Managers
Match the following elements of the Internet of Things with their functions.
(a) Things or devices (sensors and actuators) (b) Data (c) Software (d)
Internet (i) It flows from the things. (ii) Sense the environment and convey
the data, or make changes in it. (iii) It provides connectivity to bring
(a) (ii), (b) (i), (c) (iv), (d) (iii)
(a) (iii), (b) (i), (c) (iv), (d) (ii)
(a) (iii), (b) (ii), (c) (iv), (d) (i)
(a) (ii), (b) (iii), (c) (iv), (d) (i)
Match the four layers of an IoT system with their elements and functions. (a)
Device layer (b) Network layer (c) Management services layer (d)
Applications and business management layer (i) It consists of gateways,
routers and switches that connect the devices to the Internet. (ii) It consists of
th
(a) (iii), (b) (i), (c) (iv), (d) (ii)
(a) (i), (b) (ii), (c) (iv), (d) (iii)
(a) (i), (b) (iii), (c) (iv), (d) (ii)
(a) (ii), (b) (i), (c) (iv), (d) (iii)
_____ and _____ refer to the same act of breaking into computers or
computer networks illegally. However, ______ is sometimes is done for
useful reasons and is termed as ethical.
Cracking, Hacking,Hacking
Hacking,Cracking,Hacking
Hacking,Hacking,Cracking
Hacking, Breaking, Hacking
In DDoS, crackers use multiple machines to launch attacks and also spoof IP
addresses. (True/False)
TRUE
FALSE
x
x
In DDoS, server computers or host computers, which are live on the network,
act as zombies or botnets under the control of crackers and send service
requests to the victim servers. (True/False)
TRUE
FALSE
x
x
An error in the design of Microsoft email servers and clients allowed the
programs, sent as email attachments, to be executed by default. Because of
this error, which of the following malware spread rapidly across Microsoft
email servers in May 2000?
(a) SQL Slammer
(b) ILOVEYOU
(c) Stuxnet
(d) Conficker worm
Phishing and key logging are two forms of identity theft. Which of the
following statements is not true about them?
(a) In phishing, a person is duped to enter his/her bank or other details on a
fake website that resembles the actual website of the bank or government
department.
(b) To do phishing, the target people are sent emails to upgrade their login and
personal details for security reasons.
(c) In keylogging, personal data of those people is stolen who use computers in
public Internet cafes for their work.
(d) Nosoftwareisrequiredtostealpeople’sdatathroughkeylogging
In India, ________ are being used for sensing agricultural regions for what is
termed ‘precision agriculture’.
Wireless Sensor Networks
IoT
Sensors
Satellites
Many packet filtering devices use the deep packet inspection (DPI) to
examine packets for their header information as well as content. Though DPI
can uncover malware such as worms within packets, data inspection by it has
led to issues of privacy and censorship. (True/False)
TRUE
FALSE
x
x
Which of the following must not happen if Bani has to be sure that the
message received by her is from Alok only?
(a) Alok sends Bani a message that he first encrypts with his private key and
then with Bani’s public key.
(b) When Bani receives the message, she first decrypts it with her private key.
She now has a message that is encrypted with Alok’s private key.
(c) Next, Bani succeeds in decrypting the message with Alok’s public key.
(d) None of the above.
Which of the following statements is not true about a firewall and packet
filtering?
(a) At a basic level, a firewall is a packet filter device that monitors both
outgoing and incoming packets in an organisation.
(b) It is a combination of software and hardware that is usually placed inside
the router that connects the organisation to the ISP and the Internet.
(c) In a firewall, packet-level filtering can be applied to packets of different
protocols and services, to packets with specific source and destination addresses,
and to packets using specific port numbers.
(d) In a firewall, application-level filtering cannot be applied to some
applications like email.
Which of the following statements about the virtual private network (VPN)
technology are true?
(a) The VPN technology enables clients or employees of an organisation to
connect to the organisation’s network securely using the public Internet.
(b) The need for a VPN arises when the employees of an organisation or
students of an educational campus need to access securely the networks of their
organisations from outside.
(c) A VPN connection relies on authentication and encryption.
(d) All of the above
In the two-factor authentication of bank ATM cards, the first factor is the
____- itself and the second factor is the _____- the user types in to access
his/her account.
Card, Password
Password, Card
Card,Biometric
Biometric, Password
Running the system in the user mode is insecure, as worms and viruses can
wreak a lot of damage from within this mode. (True/ False)
TRUE
FALSE
x
x
Which of the following statements are true about a separate virtual network
called the demilitarised zone (DMZ) that is maintained by organisations?
(a) Attack-prone servers of an organisation – email, web and DNS servers – are
often isolated from the organisation’s network and put into the demilitarized zone
(DMZ).
(b) The DMZ is protected by a firewall. Even if a server in the DMZ is
compromised, the rest of the network is not threatened as both are isolated.
(c) The DMZ acts as a buffer for those users who access the organisation’s
services through a VPN.
(d) All of the above
Which of the following statements is not true about the mirror data centre
strategy which is part of the disaster recovery/business continuity planning of
many organisations?
(a) Mirroring entails creating an exact copy of the entire database of the
organisation.
(b) If the original database fails or is harmed, the mirror can be used to recover
whatever data is missing.
(c) Mirrors can take backup copies of the data that is being continuously
created through business transactions at the organisation.
(d) Mirrors cannot be created by scheduled backups – those backups that are
not taken in real time but are taken at specific intervals such as after every few
hours, or daily or weekly
Life cycle models specify a technique by which the coding for the software is
preceded by __________
Design
Testing
Evaluation
Modelling
__________ tools are software environments that provide graphical tools for
designing software, and some can also create code on the basis of these
designs.
CASE
CRM
PRM
STC
Software released to the targeted users for testing is said to be on the Beta
test phase. After this phase, the software is released to a larger audience, and
this is known as Alpha testing. (True/False)
TRUE
FALSE
x
x
In the one-time cutover to the new software system, organisations run the old
and new systems in parallel for a certain period of time.
TRUE
FALSE
x
x
If __________, a project will eventually take less resources than planned for.
If __________, the projects will take more resources than planned for.
Underestimated, Overestimated
Planned, Unplanned
Unplanned, Planned
Overestimated, Underestimated
Which of the following statements is not true about the function point
analysis?
(a) This is a technique to estimate the size and effort, based on one measure,
called the function point, needed to build an information system.
(b) The function point estimate is based on two broad categories of computing
requirements – data functions and transaction functions.
(c) The function point analysis has been shown to be quite effective in
providing an estimate of the size and complexity of the system.
(d) The function point analysis can also account for project- based specificities
such as changes in the project scope and requirements, skill levels of developers,
availability of platforms, etc.
________ entails deciding who can create, read, update or delete data.
Data Administration
Data Sharing
Data Privilages
Data Permissions
One feature of data independence is that the programs and applications that
use the data are aware of where and how the data is maintained.
TRUE
FALSE
x
x
For each record, there should be at least one field that uniquely identifies the
record. This unique field is called a __________ __________.
Primary Key
Secondary Key
Tertiary Key
Data Key
Which of the following statements is not true about fields, records and files
of a database?
(a) A database is a collection of files where data is stored.
(b) The basic structure of a file in a database is a field that is a defined space of
specific dimensions, in which data is placed.
(c) Records are a collection of files that have meaning in the context of an
application.
(d) Each record is like a row in a spreadsheet; it consists of a pre- defined
number of fields.
Which of the following statements are true about tables that are contained in
files of a database?
(a) A table contains records. Modern database systems allow creation of very
large tables to include billions of records.
(b) Very large tables may be split and stored on different servers.
(c) In relational databases, tables are related to each other. These relations
allow data to be linked according to some logic and then extracted from the tables.
(d) All of the above
Which of the following statements is not true about the homogeneous and
heterogeneous architectures of decentralised or distributed databases?
(a) In homogeneous architecture, the entire database of a distributed server is
replicated across many servers.
(b) In homogeneous architecture, when data is changed on any one server, the
data on the other servers remains unaffected.
(c) In heterogeneous architecture, databases across the network are not the
same, that is, distributed databases are federated in nature.
(d) In heterogeneous architecture, when application servers draw on the
databases, special algorithms pull together the required data from diverse servers
and present a consolidated picture.
Google has initiated an entire field of mining click-stream data that is known
as __________ __________ .
Server Analytics
Data Mining
Web Analytics
Web tracing
A large retailer found through a __________ __________ analysis that men
in a certain part of the USA were likely to buy beer and diapers on Thursday
evenings.
Market Basket
Mearket Seaarch
Market Mining
Market research
Which of the following sentences is not true about the procedure of the
creation of data warehouses?
(a) To create a data warehouse, data is extracted from transactional tables and
pre-processed to remove unwanted data types.
(b) During pre-processing, the data obtained from transactional tables is
maintained in a staging area, a temporary storage area, where the data is scrubbed.
(c) At the scrubbing stage, data is not corrected in any manner. The idea is to
remove clearly recognisable erroneous data from the collection of raw data.
(d) None of the above
different types of warehouse data that is used for mining? (a) Click-stream
data (b) Point-of-sale purchase data (c) Online search data (d) Text data (i)
The data collected pertains to the search texts that users type in search boxes
on web pages. It shows users’ search topics, the time at which the
(a) (iv), (b) (iii), (c) (i), (d) (ii)
(a) (iv), (b) (ii), (c) (i), (d) (iii)
(a) (iv), (b) (i), (c) (iii), (d) (ii)
(a) (i), (b) (iii), (c) (iv), (d) (ii)
In the context of data veracity, high values for signal-to-noise ratios are
always preferred, and this applies to all Big Data environments. (True/False)
TRUE
FALSE
x
x
Sources of signal in Big Data are: people typing incorrect names or hashtags,
entering wrong or misleading addresses, using pseudonyms during online
conversations, and passing off blogs as authentic news sources, etc.
TRUE
FALSE
x
x
Which of the following statements is not true about the variety of Big Data?
(a) Big Data comes in different forms such as structured, semi- structured,
unstructured and metadata.
(b) Structured data constitutes almost 80% of Big Data.
(c) Unstructured data may be in the form of log files from servers, collection of
tweets, collections of text, video or audio posts on social media sites, logs of chat
sites, etc.
(d) Major sources of semi-structured data are sensors used for IoT. Semi-
structured data is often maintained in XML or JSON languages.
Which of the following statements is not true about the example of book
purchase from an online book store discussed in the preceding section?
(a) At least four departments – information systems, marketing, accounts,
inventory and shipping – are involved in the process of selling and shipping the
book to the customer online.
(b) Two external agencies (the bank and the shipping agent) are also involved
for the process to complete.
(c) Since the online book sale process is highly automated, therefore few
people are involved in fulfilling the order.
(d) Reports generated from this process do not reach managers in all
departments.
The _____- spurred deployment of enterprise systems in organisations.
However, it turned out to be a non-problem because the dawn of the year
2000 triggered no catastrophic failures of systems.
Trojan Horse
Y2K
MIS
Y2S
What were the observations of Michael Hammer about the use of computer
technology by organisations for business process re- engineering in 1990?
(a) Hammer observed that organisations were using the power of computers to
reengineer their business processes.
(b) He observed that large-scale computerisation of processes in organisations
was automating manual processes but not changing or re-engineering them to use
the power of computers.
(c) He showed that business process re-engineering allowed managers to
integrate and streamline work processes, using the power of computer technology,
rather than create automated versions of tedious manual processes.
(d) Both (b) and (c)
The SAP ERP package does not distinguish between business modules and
business processes.
TRUE
FALSE
x
x
Which of the following is not an open source ERP software?
(a) Adempiere
(b) Microsoft Dynamics
(c) OpenBravo
(d) Compiere
Given below are the SAP four business modules and three functions or
operations of each module. Match them correctly. (a) Sales and marketing
module (b) Human resource management module (c) Manufacturing and
operations module (d) Finance and accounting module (i) Manager self-
service, enterprise com
(a) (iv), (b) (i), (c) (ii), (d) (iii)
(a) (iv), (b) (ii), (c) (i), (d) (iii)
(a) (iv), (b) (i), (c) (iii), (d) (ii)
(a) (i), (b) (iv), (c) (ii), (d) (iii)
Match the three types of suppliers with their descriptions. (a) Tier-1 suppliers
(b) Tier-2 suppliers (c ) Tier-3 suppliers (i) These suppliers may consist of a
large number of manufacturers, service agencies and financial agencies. They
supply goods and services to Tier-1 suppliers. (ii) These sup
(a) (ii), (b) (i), (c) (iii)
(a) (ii), (b) (iii), (c) (i)
(a) (i), (b) (iii), (c) (ii)
(a) (iii), (b) (i), (c) (ii)
Which of the following is not a task for whose planning and execution SCM
systems are used?
(a) Order management and manufacturing scheduling
(b) Demand assessment and distribution management
(c) PR management
(d) Transport management
The idea of CRM systems is to integrate all functions related to sales and
marketing on a common platform. (True/False)
TRUE
FALSE
x
x
Which of the following sales and marketing activities have been integrated
into CRM systems?
(a) Call centres
(b) Telemarketing
(c) Online e-commerce and support
(d) All of the above
Match the following special marketing tasks that are enabled by the CRM
system with their descriptions. (a) Bundling (b) Up-selling (c) Cross-selling
(d) Service support (i) Refers to providing data and analysis regarding all
activities related to servicing customers – feedback reports, payment info
(a) (iv), (b) (iii), (c) (ii), (d) (i)
(a) (iv), (b) (ii), (c) (iii), (d) (i)
(a) (iv)(b (i), (c) (ii), (d) (iii)
(a) (iv), (b) (iii), (c) (i), (d) (ii)
____ _______- entails training staff in the new procedures, creating new
teams and defining new tasks, creating new reporting relationships, and
creating a new culture in which employees will work.
Project Management
Program Management
System Management
Change management
Which of the following statements are true about the failure of enterprise
systems?
(a) Researchers estimate that about 75% of ERP implementation projects fail.
(b) Budget overruns or outright inability to perform after implementation are
two main causes of the failure of enterprise systems.
(c) The Foxmeyer Drug Co in the USA went bankrupt after a failed ERP
implementation.
(d) All of the above
Which of the following statements would you use to write a note on the
importance of security audit for an organisation?
(a) It is a process to find vulnerabilities in the security features technologies
and practices of an organisation. Conformity to regulatory and contractual
requirements and adherence to the organisation’s established security policies and
objectives are also assessed.
(b) Risk assessment in terms of the value of a potential monetary loss due to a
security failure is also done in security audit.
(c) A typical audit will include examining log files on servers testing known
security weaknesses in software examining data and server access rights and
interviewing users and system administrators about security practices.
(d) All of the above