0% found this document useful (0 votes)
256 views58 pages

ISM MCQs

The document provides information about team work and LinkedIn profiles of individuals. It also contains a series of multiple choice questions related to information systems, management, and technology. The questions cover topics such as data, information, hardware/software components, communication methods, the dotcom boom, e-commerce, and search engines.

Uploaded by

JISMY JOHNSON
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
256 views58 pages

ISM MCQs

The document provides information about team work and LinkedIn profiles of individuals. It also contains a series of multiple choice questions related to information systems, management, and technology. The questions cover topics such as data, information, hardware/software components, communication methods, the dotcom boom, e-commerce, and search engines.

Uploaded by

JISMY JOHNSON
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

TEAM WORK

LINKED ID: www.linkedin.com/in/jatinkohli057


Twitter Id: https://twitter.com/jatink057
LINKED ID: https://www.linkedin.com/in/yukta-daultani-9a2873243/
LINKED ID: https://www.linkedin.com/in/priyagya-nigam-963a801b8

NMIMS MCQs - Information System For


Managers

An organisation’s _______________ refers to the information that is stored


processed and converted into forms that make it an integral part of the
organisation.
Knowledge Base
Data
Intelectual Propoerty
Flow Chart

The organisations are linked as nodes on the network where they receive and
transmit information. (True/False)
TRUE
FALSE
x
x

Which of the following is not a feature of a modern organisation?


(a) IT-enabled organisation
(b) Networked organisation
(c) Dispersed organisation
(d) None of the above

Information technology includes _______________ devices such as personal


computers, notebook computers, mobile phones, etc. and various types of
networks.
Computing
Mouse
Laptop
Gaming

A printer, used in an organisation, is also a component of the IS of the


organisation. (True/False)
TRUE
FALSE
x
x

With the current availability of data on the Web, the most important data can
be accessed easily. (True/False)
TRUE
FALSE
x
x

Organisations create _______________ that run on smartphones, and give


exclusive access to information and services of the organisation to the user.
Apps
Codes
Software
MIS

The outcomes that arise as a direct consequence of the introduction of an IS


are known as _______________ effects.
First Order
Second Order
Third Order
Fourth Order

The second-order effects of the implementation of a new IS in an


organisation
(a) become visible immediately
(b) may become visible within a few weeks
(c) may require years to become visible or measurable.
(d) both (a) and (b)

The city government obtains data from the information systems of firms in a
city regarding their employees offices and places of living for promoting
carpooling. This is an example of the _______________ effects of
implementation information systems by the firms.
(a) third order
(b) second order
(c) first order
(d) both (b) and (c)

It is quite likely that when a new information system is introduced in an


organisation, it has to blend with the already existing IT infrastructure of the
organisation. (True/False)
TRUE
FALSE
X
X

While planning an information system, managers in many organisations have


to consider trade-offs between speed and _______________ of information.
(a) amount
(b) accuracy
(c) sources
(d) both (b) and (c)

Internal threats to an information system arise from computer viruses that


enter through the Internet services and disrupt the functioning of different
systems within the organisation.
TRUE
FALSE
c
d
In an economy in which the firm is doing well, managers value information
related to
(a) employee satisfaction
(b) market share
(c) budgets and costs, receivables
(d) both (a) and (b)

When processed, data is called __________.


data
information
knowledgfe
raw data

Memory __________are designated in kilobytes, megabytes or gigabytes.


Capacities
capabilities
speed
availability

One kilobyte is equal to 1000 bytes. (True/False


TRUE
FALSE
x
x

Though information is processed data, it can be treated as raw data for further
processing. (True/False)
TRUE
FALSE
x
x

Which of the following types of information systems are used by an


organisation?
(a) Those meant for individual users.
(b) Those meant for people working in groups.
(c) Those meant for the entire organisation.
(d) All of the above

The raw data and the information produced from it are stored in software
programs called
(a) Apps
(b) Office suites
(c) Databases
(d) Presentation programs

NMIMS MCQs - Information System For


Managers

Like money, labour and materials, information is also a __________ for an


organisation.
Resources
asset
gold
money

Storing organisational information, which is no more useful for the


organisation, in some compressed form is called __________.
storing
Archiving
Zipping
Backup

Information resources, created by an organisation, are its assets. (True/False)


TRUE
FALSE
x
x

Personnel involved in functions and working in departments in any


organisation are placed in a _________.
Hierarchy
Role
Cubicle
Group

In an organisation, the bottom of its hierarchy consists of the middle


managers who head functions or departments. (True/False)
TRUE
FALSE
x
x

The information, gathered by marketing executives from potential customers,


is used by the marketing manager to decide on which of the following issues:
(a) What kind of product to pitch to the customer.
(b) When to make another contact.
(c) Whether to make a special offer.
(d) All of the above

The data pertaining to which of the following aspects is not useful for the
human resources function of an organisation?
(a) Data about the employees attendance
(b) Data about the employees days of leave
(c) Data about the type of components used in a product
(d) Data about the functions the employees perform

The __________ information systems do not permit much flexibility to


individuals to change processes or communication patterns.
Enterpries
MIS
Company
Personal

Modern information systems are created for specific functions of the


organisation with little sharing of data among the information systems of
different functions. (True/False)
TRUE
FALSE
x
x

Which of the following is not a component of modern information


technology infrastructure in an organisation?
(a) Enterprise information technology
(b) Network information technology
(c) Functional information technology
(d) None of the above

The transaction processing systems are designed to respond quickly and in a


manner that makes them appear __________ to the user.
Live
Offline
Sacured
Fast

MIS reports prepared in the __________ mode allow managers to drill down
to details.
Batch
Group
Live
Offline

Activities ranging from procuring materials to receiving payments to


shipping goods out to warehouses are all recorded by the transactions
processing systems. (True/False)
TRUE
FALSE
x
x

Sensing and monitoring of the organisation may be done in real time or in


batch mode. (True/False)
TRUE
FALSE
x
x

Which of the following is not part of the information contained in a typical


MIS report?
(a) A report on the average daily sales of the organisation.
(b) The daily production of goods
(c) A report on personnel and project assignments
(d) None of the above

Which of the following is not part of the information provided by executive


support systems to those at the highest level of any organisation?
(a) A report on sales forecasts for all products, plotted against the forecasts for
the entire industry.
(b) A summary of cash balances for all divisions for the year, the month and
the week, with an ability to drill down to details for all divisions.
(c) A summary of completion of all projects, with details of work remaining,
estimated overruns on time and cost with comparison figures of projects in the
past.
(d) None of the above

Tactical decisions are made by managers that have a medium-term scope.


(True/False)
TRUE
FALSE
x
x

Strategic decisions are related to the ____________ and ____________ of


the organisation.
Vision, Mission
Mission, Vision
Network, Planning
Planning, Network
Managers and supervisors need information
(a) for control and planning
(b) for making tactical decisions
(c) for making strategic decisions
(d) both (b) and (c)

The travelling salesman problem is an example of


(a) a tactical decision
(b) an operational decision
(c) a strategic decision
(d) both (b) and (c)

NMIMS MCQs - Information System For


Managers

____________ happens when two or more parties communicate


simultaneously.
Synchronous communication
Asynchronous communication
Multichannel communication
Multiplex communication

The ____________tag can be used by banks to identify customers entering


their offices.
RFID
NFC
Bluetooth
Wi-Fi

Email is an example of simplex communication. (True/False)


TRUE
FALSE
x
x
Which of the following communication is essentially half-duplex in nature?
(a) Email
(b) Phone conversation
(c) Online streaming
(d) Two persons talking simultaneously

The term ‘bubble’ refers to the dramatic rise in the overall stock prices of
new firms in the USA and India in the late 1990s. (True/ False)
TRUE
FALSE
x
x

In the year 2000, many large investors started selling stocks of many new
overpriced firms. This is referred to as the ‘bust’ of the dotcom bubble.
(True/False)
TRUE
FALSE
x
x

In the USA, the Internet was opened for commercial use in


(a) 1990
(b) 1993
(c) 1999
(d) 1989

The dotcom boom of the late 1990s refers to


(a) Setting up a large number of start-ups
(b) Setting up a large number of start-ups in Asia
(c) Setting up a large number of start-ups in Europe
(d) Setting up a large number of start-ups using Internet technologies to provide
new goods and services

A ___________ is a single site that contains links to and information about


other sites.
Portal
Hub
Webpage
Site

Search engines are built upon ___________ to search information and data
within web pages and categorise them.
HTML
Google
HTTPS
SMTP

Electronic commerce, or e-commerce, refers to businesses that use the


Internet technologies as a basis for transactions. (True/False)
TRUE
FALSE
x
x

Google’s method of searching Web pages for a particular keyword or


keywords looks at links to a page as a measure of its worth rather than the
count of the keyword or keywords (being searched) on a page. (True/False).
TRUE
FALSE
x
x

Direct selling to consumers is often referred to as business to business (B2B)


TRUE
FALSE
x
x

Which of the following is not an advantage of placing advertisements on


websites through Google?
(a) Clients place advertisements on websites in easily through a form on
Google’s site.
(b)Google gets a fixed charge from clients for placing their advertisements on
websites.
(c) Google places advertisements in a context-sensitive manner.
(d) Google records the click-throughs of all its viewers and researches this
information to understand the contextual relevance of keywords.

In which of the following selling methods, manufacturers can directly


connect with customers without the need of intermediaries?
(a) Direct selling – when goods are sold through a website
(b) Traditional selling through a retailer
(c) Supply of goods to a retailer by wholesalers and distributors
(d) Both (a) and (b)

Transactions conducted on eBay fall into which of the following categories?


(a) C2C
(b) B2B
(c) B2G
(d) G2G

Which of the following is not an aspect of B2B e-commerce?


(a) The value of B2B transactions is low as compared to B2C transactions.
(b) B2B markets do not have fixed prices and may involve auctions of goods.
(c) B2B transactions involve many buyers and many sellers in the market.
(d) The delivery schedule and timing of goods purchased is of critical
importance in B2B e-commerce.

E-commerce focuses on an organisations commercial transaction (buying,


selling, auctions, & searching) with its customers, bute- business aims at
enhancing the internal functioning of the organisation by using the facilities
of the internet. (True/False)
TRUE
FALSE
x
x
In a supply chain, downstream firms provide components to upstream firms.
(True/False)
TRUE
FALSE
x
x

Which of the following messages are exchanged using an e-business


infrastructure?
(a) Work reports
(b) Invoices
(c) Delivery schedules
(d) All of the above

NMIMS MCQs - Information System For


Managers

In India, the provision of an online interface by the government to businesses


to file their taxes online is an example of ___________ services.
G2B
G2C
G2G
C2G

G2B services provide convenience to citizens in fulfilling various needs.


(True/False)
TRUE
FALSE
x
x

G2G services are internal to government departments. (True/False)


TRUE
FALSE
x
x

Which of the following technologies are used in e-governance?


(a) E-commerce technology
(b) E-business technology
(c) Both (a) and (b)
(d) Banking transaction technology

The Bhoomi system of Karnataka and eSeva system of Hyderabad are


examples of which type of e-governance services?
(a) G2B
(b) G2C
(c) G2G
(d) Both (a) and (b)

Energy consumption usually entails burning fossil fuels that add to


________- in the atmosphere.
Greenhouse Gases
Smoke
Temperature
Pollution

The Kyoto Protocol recommended stringent guidelines on restraining carbon


emissions by certain _______ that had agreed to implement the protocol.
Developed countries
Developing Countries
Third World Countries
European Countries

After the expiry of the term of the Kyoto Protocol, which amendment has
been proposed as an extension to the Kyoto Protocol?
(a) Kyoto Amendment
(b) New York Amendment
(c) Colombo Amendment
(d) Doha Amendment
Since carbon dioxide remains in the atmosphere for a relatively long
duration, it has the strongest contribution to global warming. (True/ False)
TRUE
FALSE
x
x

Which of the following activities produce greenhouse gases?


(a) Production of electrical energy by burning fossil fuels
(b) Burning of fossil fuels for transportation
(c) Manufacturing
(d) All of the above

Greenhouse gases absorb which component of sun’s energy in the earth’s


atmosphere?
(a) Infra-red radiation
(b) Visible light
(c) Ultra-violet radiation
(d) All of the above

The carbon or GHG emission of an organisation is related to only from one


or more processes within the organisation. (True/False)
TRUE
FALSE
x
x

The carbon footprint for a computer is calculated by assessing which of the


following energy requirements?
(a) The energy required to make each part of the computer
(b) The energy required to transport the parts from different places in the world
(c) The energy required to assemble and process the assembled computer
(d) All of the above

For a firm, one aspect of green practices implies using IT efficiently to


comply with green norms. (True/False)
TRUE
FALSE
x
x

Design of IT products can follow green practices and this includes design of
both ________ and _________ .
Hardware, Software
Structure, Surroundings
Buildings, Equipments
Firmware,Software

From the prototype of an IT product, the environmental impact of which of


the following aspects of the product be assessed?
(a) The materials required for the product
(b) The energy required to assemble the product components
(c) Whether the product components are considered to be damaging to the
environment
(d) All of the above

For achieving efficiency in computation, modern computers have ________-


built into their CPU core unit.
Multiple Processors
I7 Processors
RAM
ROM

Algorithms that take the least number of steps to come up with the answer for
a search task are considered energy efficient because they impose a lesser
burden on the processors in the active state.
TRUE
FALSE
x
x
Buffering does not reduce the energy required to read data for an application.
(True/False)
TRUE
FALSE
x
x

A context-aware laptop on being disconnected from the power source


reduces screen brightness or hard-disk usage.
TRUE
FALSE
x
x

NMIMS MCQs - Information System For


Managers

Wastage of energy can be minimized by unplugging electronic devices from


their charging point when their charging is complete. (True/False)
TRUE
FALSE
x
x

To save energy, modern processors can be under-clocked or speeded down


when their high performance is not needed. (True/False)
TRUE
FALSE
x
x

Which of the following ways can be used to reduce energy consumption by


computers?
(a) Shutting down the background processes of the computer, which are not
required.
(b) Under-clocking and over-clocking of processors.
(c) Defragmenting the disk
(d) All of the above

In closed-loop manufacturing, an organisation uses the reusable parts of its


own _________ products in its manufacturing process.
Recycled
New
Refurbished
Old

In inbound logistics, one green practice is procurement from suppliers where


least energy is spent and shipping distances are minimal. (True/False)
TRUE
FALSE
x
x

In which of the following business activities one green practice is to inform


customers of how product life can be extended?
(a) Sales and marketing
(b) Production
(c) Maintenance
(d) None of the above

The smart city definition, given by the Government of India, and a smart
definition coming from Europe, both emphasise use of IT and
communications infrastructure, sustainability, etc. in smart cities.
(True/False)
TRUE
FALSE
x
x
Sensing “handovers”, that is, movement of phones from one mobile tower to
another, as the phone is moving in the car, does not give a better estimate of
the number of cars moving on the road. (True/False)
TRUE
FALSE
x
x

The maps provided by OpenStreetMap are not publicly available as they are
created and owned by a corporation. (True/False)
TRUE
FALSE
x
x

According to the smart city definition, given by the Government of India,


which of the following is not an IT-based smart solution associated with a
smart city?
(a) Urban mobility management
(b) Luxury life management
(c) Waste management
(d) Electronic governance

Which of the following is part of water-related measurements by sensors in


cities?
(a) Rainfall
(b) Humidity
(c) Urban waste water discharge in local lakes
(d) All of the above

While dealing with large quantities of data generated by sensors in the green
IT and smart city projects, managers face the challenges of storage,
management, disposal and ______.
Compliance
Integrity
Accuracy
Availability

The issue of ________ has been flagged in cities and countries, where
citizens feel that their everyday activities are being sensed, and the data
generated from these activities is being stored and later analysed.
Privilege
Piracy
Privity
Privacy

With respect to the cost incurred on creating new infrastructure for green IT,
the challenge for managers is to ensure that the benefits from green IT should
exceed the cost incurred.
TRUE
FALSE
x
x

An _______- is the complete IT-enabled environment that exists for


employees of an organisation to work in.
IT Framework
IT Ecosystem
IT Environment
IT Network

An IT infrastructure consists of hardware, software, networks and services


that combine to form applications that are used by the organisation, such as
e-commerce, materials management, accounting, customer relationship
management (CRM), etc. (True/ False)
TRUE
FALSE
x
x
An organisation’s decisions with regard its IT infrastructure loosely pertains
to two categories –those belonging to business needs and those belonging to
technology concerns. (True/False)
TRUE
FALSE
x
x

The hype around a technology drops when the media and users realise that
the technology is either not mature enough to enter the market or not as good
as the technology media projected it to be. (True/False)
TRUE
FALSE
x
x

Which of the following IT infrastructure questions are not related to the


organisation’s business needs?
(a) How does the technology help the organisation compete?
(b) What will be the nature of the technology lock-in?
(c) What business needs have to be met with the infrastructure components?
(d) b and c

The ________ is the central pathway for transferring data around the
computer.
USB
BUS
3 pin
Data link

NMIMS MCQs - Information System For


Managers
_______ occurs when the data in the cache is outdated as the cache has not
swapped it with the RAM.
Cache miss
Cache error
Cache Overload
Cache Overwrite

Servers are distinguished from ______- , which are computers that demand
and receive services from servers.
Clients
Hub
Networks
Operating Systems

The ______ boots up the computer and takes control of all the components.
Computer
RAM
ROM
Operating Systems

Database applications are not easily ________ and do create a lock-in when
users opt for one.
Interchangeable
Recoverable
Updatable
Bootable

_______- software allows management to have both a forest view of the


organisation and a view at the level of trees and branches.
Enterprise
MIS
ISM
Root Level

_______ reduces the size of files so that the storage capacity can be used
more efficiently.
Winrar
Winzip
Compression Software
Expansion Software

The RAM speed is an indication of how fast the memory device is able to
read or change its contents.
TRUE
FALSE
x
x

Devices such as flash drives and compact discs are examples of fixed
storage.
TRUE
FALSE
x
x

Tape drives still provide the most cost effective and reliable storage
available. But they are slower than other drives and because of their
sequential reading process, searching data in them is difficult and slow.
TRUE
FALSE
x
x

Application software allows users to use the computer to do their work.


Application software is designed for a particular operating system.
TRUE
FALSE
x
x
Software that is distributed only in the compiled binary version is called open
source software, whereas software that is distributed with the source code is
called proprietary software.
TRUE
FALSE
x
x

This type of software has limited functionality as it is used in special-


purpose processors which control equipment such as machinery, hardware
and fluid devices in cars. Which is this software?
Root Level
Embedded Software
Outlay Software
Inbuilt Software

To view or modify files containing images, music or video data, which type
of software is used?
Multimedia Software
VLC
Media Player
Video Player

Which of the following statements is not true about the processor


components and functions, RAM and cache?
(a) The CPU or processor consists of the control unit, the arithmetic logic unit
(where the gates are located) and the registers.
(b) Registers are essential components of a processor, which are fast storage
devices that temporarily hold the data needed for computation.
(c) The work in a processor is done in machine cycles. Each cycle consists of
two parts: instruction cycle and execution cycle.
(d) RISC processors are more expensive compared to CISC processors, which
could be slower.

Which of the following statements is not true about the instruction cycle and
the execution cycle that are followed in the processor for doing a work?
(a) In the instruction cycle, the data and instructions are fetched from the
external memory, decoded and stored in the registers for running then through the
gates.
(b) In the execution cycle, the instructions and data, which are stored in the
registers, are fed through the gates. The results obtained from the computations,
done by the gates, are stored back in the registers.
(c) The instructions that are acted upon could be related to transferring data
(from one part of the computer to another), arithmetic operations, logical
operations, and control operations that determine a sequence of actions to take.
(d) After the completion of a machine cycle, the processor goes idle for a very
short duration before starting another cycle.

Which of the following statements is not true about desktops and laptops?
(a) The key advantage of desktops is they can be upgraded quite easily, as
there is plenty of space in the CPU units to add or change the components.
(b) Laptops cannot be easily upgraded as the components within them are
packed quite tightly and cannot be easily interchanged or replaced.
(c) Laptops have a smaller renewal cycle as they are more prone to physical
shocks and mechanical wear.
(d) Desktop purchases are usually more expensive than laptops, when
compared feature by feature.

Which of the following statements is not true about servers and


workstations?
(a) Servers, equipped with high-speed processors and high- capacity RAM, are
used to provide applications to the entire organisation across its networks. In
modern servers, storage is separated to another class of peripherals.
(b) Workstations are high-end desktop computers that have high- capacity
CPUs and fast RAM. They are used for specialised applications such as graphics
manipulation and numerical processing.
(c) In multi-core servers, a single physical chip has more than one CPU. Multi-
core servers cost less, give improved utilisation, and save on energy costs.
(d) Servers have a shorter renewal cycle.

Which of the following statements are true about the storage area network
(SAN)?
(a) A storage area network (SAN) consists of hard disk arrays and is
maintained separately on the network. However, to all the computers on the
network, SAN appears to be an attached disk drive.
(b) SAN enables many users and computers to share the same storage, which
can be effectively backed up and protected centrally.
(c) SAN provides flexibility in scaling up as only the storage unit needs to be
upgraded, not the computer boxes using the storage.
(d) All of the above

Which of the following statements are not true about the operating system
(OS)?
(a) The OS controls all the hardware in computers. It also manages the work
given to the processor, including scheduling and prioritising various tasks.
(b) After the computer boot-up, the OS manages the available memory in
RAM by loading and unloading programs as per the user’s need.
(c) The OS does not manage or run the drivers of any peripheral hardware.
(d) The operating system also manages a user interface, which is graphical in
most modern operating system.

Enterprise systems are a class of systems that allow multiple possible


applications to be run in a ____ , ______ manner.
De-Centralised, Coordinated
Centralised, Coordinated
Centralised, Un-Coordinated
De-Centralised, Un-Coordinated

NMIMS MCQs - Information System For


Managers

_______ refers to the process of contracting out the management of


computing resources of an organisation.
IT Outsourcing
IT Insourcing
IT development
IT Contracting

The _______ is a technology that loosens the tight coupling between the
hardware and the operating system.
Virtual Server
VPN
SandBox
Private Machines

If in an organisation, any of the interoperable technologies is upgraded, it


may not be easy to ensure that it remains interoperable with the other
technologies as it were earlier. (True/False)
TRUE
FALSE
x
x

Virtualisation allows many operating systems to be installed on the


processors, each having its own dedicated resources of hard disk space, RAM
and network connectivity. (True/False)
TRUE
FALSE
x
x

Which of the following statements are true about the time and materials
model of IT outsourcing?
(a) In this model, the vendor brings skilled staff and resources, such as
software and computers, to the site of the client to build systems.
(b) The vendor bills the client for the hours spent on the job (per employee)
and the costs of the hardware and software used.
(c) This model is best suited for clients who are not very sure of their
requirements, and need the skills of the vendor to get going on their project.
(d) All of the above

Cloud computing implies that computing facilities and infrastructure can be


obtained over the Internet.
TRUE
FALSE
x
x

Cloud-based IT infrastructure is more scalable than hosted IT infrastructure.


TRUE
FALSE
x
x

It is not possible to price cloud services according to the usage and needs of
the client.
TRUE
FALSE
x
x

Applications that have large data streams with variety and high rates of
accumulation are not best stored on cloud servers that can accommodate the
scale.
TRUE
FALSE
x
x

Applications, which are characterized by the tight coupling between their


hardware and software, cannot be easily moved to the cloud. (True/False)
TRUE
FALSE
x
x

Which of the following applications is not best stored on cloud servers?


(a) Applications that require collaboration
(b) Applications that have volatile demand
(c) Low business risk and commodity applications
(d) Applications that do not scale
__________ works by creating a software layer on top of the hardware. But
in __________ this software layer is removed, making them ‘lighter’ or with
lesser software code and also more pliable.
Immersiveness, Containers
Virtualisation, containers
Immersiveness, Containers
Virtual Reality, Containers

In a furnished apartment most of the facilities for living are already available
and the renter can start living there with only her personal effects. This
analogy corresponds to which of the following cloud service models?
(a) SaaS
(b) PaaS
(c) IaaS
(d) None of the above

Match the following cloud service model with their features (a) SaaS model
(b) PaaS model (c) IaaS model (i) Users have access to a number of tools
and packages with which an IT solution can be built and deployed on the
cloud. (ii) Users can install their own application software on the infrastru
(a) (ii) (a) (i) (c) (ii)
(a) (ii) (a) (iii) (c) (i)
(a) (iii) (a) (ii) (c) (i)
(a) (i) (a) (iii) (c) (ii)

Match the following. (a) Community cloud (b) Private cloud (c) Public cloud
(d) Hybrid cloud --> (i) The software that manages this cloud responds to
cloud bursts by provisioning extra resources from the public cloud as
required. (ii) This cloud is a truly shared facility that allows multiple client
(a) (iii), (b) (iv), (c) (ii), (d) (i)
(a) (ii), (b) (iv), (c) (iii), (d) (i)
(a) (iii), (b) (iv), (c) (i), (d) (ii)
(a) (iii), (b) (ii), (c) (iv), (d) (i)

Which of the following is not a feature of cloud computing?


(a) Scalability: The IT infrastructure of a cloud has the ability to address a
client’s demand for increased resources in real time.
(b) Elasticity: The IT infrastructure of a cloud has the ability to both expand
and contract depending upon the demand for its resources.
(c) Heterogeneity: The heterogeneous systems or components of a cloud can be
viewed and managed easily through the method of virtualization via a single
interface.
(d) Service levels: Once installed, service levels that specify the quality of the
facilities available to cloud users are difficult to change or modify

___________ technologies form the basis of collecting, storing and analysing


data that is obtained from the devices in the Internet of Things.
cloud
VPN
VPS
Shared Servers

Sensors that are able to filter out redundant data to remove noise from the
analysis are known as ___________
Smart Filters
Smart Servers
Smart Sensors
Smart Systems

The layered architecture of an IoT system is of no help in managing the


layers of this system in an independent manner.
TRUE
FALSE
x
x

Sensors and actuators refer to things in the Internet of Things. (True/ False)
TRUE
FALSE
x
x
NMIMS MCQs - Information System For
Managers

The configurations of things connected to the Internet are referred to as


(a) Internet-of-Everything (IoE)
(b) Internet 4.0
(c) Industrial Internet-of-Things (IIoT)
(d) All of the above

For which of the following tasks radio-frequency-identification (RFID) tags


are not used.
(a) Tracking material in a factory
(b) Exact location of the new inventory in a factory
(c) Exact time and quantity of finished goods moved out of the factory
premises
(d) Tracking the health parameters of those involved in inventory- related jobs

Match the following elements of the Internet of Things with their functions.
(a) Things or devices (sensors and actuators) (b) Data (c) Software (d)
Internet (i) It flows from the things. (ii) Sense the environment and convey
the data, or make changes in it. (iii) It provides connectivity to bring
(a) (ii), (b) (i), (c) (iv), (d) (iii)
(a) (iii), (b) (i), (c) (iv), (d) (ii)
(a) (iii), (b) (ii), (c) (iv), (d) (i)
(a) (ii), (b) (iii), (c) (iv), (d) (i)

Match the four layers of an IoT system with their elements and functions. (a)
Device layer (b) Network layer (c) Management services layer (d)
Applications and business management layer (i) It consists of gateways,
routers and switches that connect the devices to the Internet. (ii) It consists of
th
(a) (iii), (b) (i), (c) (iv), (d) (ii)
(a) (i), (b) (ii), (c) (iv), (d) (iii)
(a) (i), (b) (iii), (c) (iv), (d) (ii)
(a) (ii), (b) (i), (c) (iv), (d) (iii)

Privacy becomes an issue when analysis of data on the health of individuals,


gathered through IoT devices, is carried without an explicit consen t
TRUE
FALSE
x
x

A _____ penetrates computers and networks by mainly replicating itself. It


does not harm the computer system or network components. It only
consumes storage space and network bandwidth while propagating and
spreading.
Trojan
Virus
Worm
Malware

_____ and _____ refer to the same act of breaking into computers or
computer networks illegally. However, ______ is sometimes is done for
useful reasons and is termed as ethical.
Cracking, Hacking,Hacking
Hacking,Cracking,Hacking
Hacking,Hacking,Cracking
Hacking, Breaking, Hacking

Cracking by reverse engineering refers to the trick to exploit the insecurity


and lack of knowledge of human users.
TRUE
FALSE
x
x

In DDoS, crackers use multiple machines to launch attacks and also spoof IP
addresses. (True/False)
TRUE
FALSE
x
x

In DDoS, server computers or host computers, which are live on the network,
act as zombies or botnets under the control of crackers and send service
requests to the victim servers. (True/False)
TRUE
FALSE
x
x

An error in the design of Microsoft email servers and clients allowed the
programs, sent as email attachments, to be executed by default. Because of
this error, which of the following malware spread rapidly across Microsoft
email servers in May 2000?
(a) SQL Slammer
(b) ILOVEYOU
(c) Stuxnet
(d) Conficker worm

Phishing and key logging are two forms of identity theft. Which of the
following statements is not true about them?
(a) In phishing, a person is duped to enter his/her bank or other details on a
fake website that resembles the actual website of the bank or government
department.
(b) To do phishing, the target people are sent emails to upgrade their login and
personal details for security reasons.
(c) In keylogging, personal data of those people is stolen who use computers in
public Internet cafes for their work.
(d) Nosoftwareisrequiredtostealpeople’sdatathroughkeylogging

Which of the following statements is not true about a denial-of- service


(DoS) attack?
(a) It is a method by which crackers pull down or slow down the services of a
website.
(b) It relies on the three-step handshake of connection-oriented protocols.
(c) The cracker client disrupts the three-step handshake in the very first step.
(d) Legitimate users seeking information from a site facing a DoS have to wait
in a queue to be served.

The method of authentication using the public-key technology is called


_______-.
Validation
Encryption
Digital Signature
Block Chain

Wireless devices rely on ______ of different frequencies to connect with


each other to share information.
EMF
Bluetooth
NFC
Radio Waves

In India, ________ are being used for sensing agricultural regions for what is
termed ‘precision agriculture’.
Wireless Sensor Networks
IoT
Sensors
Satellites

In symmetric-key cryptography, the sender and the receiver of a message do


not share a single key to encrypt and decrypt the message. (True/False)
TRUE
FALSE
x
x
Generally, firewalls of organisations ban traffic on port number 23, which is
used for an Internet application called Telnet. Telnet allows remote users to
login to machines within the organisation. (True/ False)
TRUE
FALSE
x
x

Many packet filtering devices use the deep packet inspection (DPI) to
examine packets for their header information as well as content. Though DPI
can uncover malware such as worms within packets, data inspection by it has
led to issues of privacy and censorship. (True/False)
TRUE
FALSE
x
x

Match the following terms related to encryption technology. (a) Encryption


(b) Plaintext (c) Ciphertext (d) Key(i) The coded or encrypted message. (ii) It
is used to code or scramble a message and then return to its original form.
(iii) The original message to be encrypted. (iv) This technology tran
(a) (iv), (b) (iii), (c) (i), (d) (ii)
(a) (iv), (b) (ii), (c) (iii), (d) (ii)
(a) (iv), (b) (i), (c) (iii), (d) (ii)
(a) (iv), (b) (ii), (c) (i), (d) (iii)

NMIMS MCQs - Information System For


Managers

Which of the following statements are not true about public-key


cryptography?
(a) In this method, a message is encrypted with a public key and decrypted
with a private key.
(b) Both the public and private keys are created as a pair, but the private key is
kept secured so that no unauthorized person could decrypt the message.
(c) Public and private keys are created using prime numbers through the RSA
encryption technique.
(d) If the keys are based on small prime numbers, it is very difficult for
crackers to find them within a reasonable period of time.

Which of the following must not happen if Bani has to be sure that the
message received by her is from Alok only?
(a) Alok sends Bani a message that he first encrypts with his private key and
then with Bani’s public key.
(b) When Bani receives the message, she first decrypts it with her private key.
She now has a message that is encrypted with Alok’s private key.
(c) Next, Bani succeeds in decrypting the message with Alok’s public key.
(d) None of the above.

Which of the following statements is not true about a firewall and packet
filtering?
(a) At a basic level, a firewall is a packet filter device that monitors both
outgoing and incoming packets in an organisation.
(b) It is a combination of software and hardware that is usually placed inside
the router that connects the organisation to the ISP and the Internet.
(c) In a firewall, packet-level filtering can be applied to packets of different
protocols and services, to packets with specific source and destination addresses,
and to packets using specific port numbers.
(d) In a firewall, application-level filtering cannot be applied to some
applications like email.

Which of the following statements about the virtual private network (VPN)
technology are true?
(a) The VPN technology enables clients or employees of an organisation to
connect to the organisation’s network securely using the public Internet.
(b) The need for a VPN arises when the employees of an organisation or
students of an educational campus need to access securely the networks of their
organisations from outside.
(c) A VPN connection relies on authentication and encryption.
(d) All of the above

Which of the following statements is not true about these wireless


(a) Wi-Fi or Wireless Fidelity is an IEEE-approved communication standard
that is specified by the IEEE 802.11 series of specifications.
(b) Wi-Fi is used with ‘hotspots’ or access points that are routers. The hotspot
allows the devices, connected to a LAN in an office or home, to share a pool of IP
addresses, provided by the router, to communicate with the Internet.
(c) When Wi-Fi devices or routers are used in a mesh network then all devices
in that network need to have a connection to the Internet through an ISP.
(d) The Bluetooth standard was created for connecting personal devices.
Therefore, this standard offers lower data transfer rates and operates over a short
distance.

In the two-factor authentication of bank ATM cards, the first factor is the
____- itself and the second factor is the _____- the user types in to access
his/her account.
Card, Password
Password, Card
Card,Biometric
Biometric, Password

______ monitor traffic at the network interface of the personal computer.


They are especially useful for those desktops that use fixed IP address and
are connected to the Internet for long hours.
System Firewalls
Firewalls
VPN
Desktop firewalls

Running the system in the user mode is insecure, as worms and viruses can
wreak a lot of damage from within this mode. (True/ False)
TRUE
FALSE
x
x

Which of the following statements are true about a separate virtual network
called the demilitarised zone (DMZ) that is maintained by organisations?
(a) Attack-prone servers of an organisation – email, web and DNS servers – are
often isolated from the organisation’s network and put into the demilitarized zone
(DMZ).
(b) The DMZ is protected by a firewall. Even if a server in the DMZ is
compromised, the rest of the network is not threatened as both are isolated.
(c) The DMZ acts as a buffer for those users who access the organisation’s
services through a VPN.
(d) All of the above

Match the following security features of the IS infrastructure of an


organisation with their descriptions. (a) Confidentiality (b) Authentication (c)
Message integrity (d) Access and availability (i) Both the sender and the
receiver should know if the contents of the message are intact. If there is
(a) iv, (b) (ii), (c) (i), (d) (iii)
(a) iv, (b) (i), (c) (iii), (d) (ii)
(a) iv, (b) (i), (c) (ii), (d) (iii)
(a) iv, (b) (iii), (c) (i), (d) (ii)

Which of the following statements is not true about the mirror data centre
strategy which is part of the disaster recovery/business continuity planning of
many organisations?
(a) Mirroring entails creating an exact copy of the entire database of the
organisation.
(b) If the original database fails or is harmed, the mirror can be used to recover
whatever data is missing.
(c) Mirrors can take backup copies of the data that is being continuously
created through business transactions at the organisation.
(d) Mirrors cannot be created by scheduled backups – those backups that are
not taken in real time but are taken at specific intervals such as after every few
hours, or daily or weekly

Life cycle models specify a technique by which the coding for the software is
preceded by __________
Design
Testing
Evaluation
Modelling
__________ tools are software environments that provide graphical tools for
designing software, and some can also create code on the basis of these
designs.
CASE
CRM
PRM
STC

During software development, code tests are conducted for individual


modules called _________, and for some modules clubbed together called
_________.
Stub testing, integration testing
Integration testing, Stub testing
Integration Testing, Hub Testing
Hub Testing, Integration Testing

_________ testing of the software is more rigorous as it forces the software


to encounter situations it has not seen before. This often requires updating the
software with patches and fixes.
Beta
Alpha
Gamma
Firmware

A software package is said to be in _________ _________ when it is being


used to the full capacity for the purpose it is created for.
Testing Mode
Production Mode
User Mode
Final Mode

After the completion of the analysis stage of software development, if the


project requirements are changed then this is called _________ _________.
Scope Creep
Creep Scope
ScopeTest
Scope Modelling

The life cycle model of software development is named so because it refers


to the entire life of the software, from creation to retirement and replacement
by another software. (True/False)
TRUE
FALSE
x
x

Software released to the targeted users for testing is said to be on the Beta
test phase. After this phase, the software is released to a larger audience, and
this is known as Alpha testing. (True/False)
TRUE
FALSE
x
x

In the one-time cutover to the new software system, organisations run the old
and new systems in parallel for a certain period of time.
TRUE
FALSE
x
x

NMIMS MCQs - Information System For


Managers

The agile methods of software development rely on short analysis– design–


coding–testing cycles. (True/False)
TRUE
FALSE
x
x

Which of the following statements is wrong about the Waterfall Model of


software development?
(a) It was the first life cycle model of software development. It depicts six
stages arranged in steps, or a waterfall.
(b) The first three stages are called the upper stages and the other three stages
are called the lower stages of the software development process.
(c) Often the first three are considered the most critical and important parts of
the life cycle.
(d) None of the above

Which of the following are criticisms of the Waterfall Model?


(a) In this model, software development work progresses in a linear and
bureaucratic manner. This model ignores the feedback aspect, as not much
feedback is received to alter the previous stages.
(b) This model slows down the development process, particularly for small
software. The reason is that the documentation, required in this model, is
considered to be tedious for small projects.
(c) The cost of finding and fixing mistakes varies according to the stage at
which the mistake is detected and fixed. The cost of fixing errors increases non-
linearly.
(d) All of the above

If __________, a project will eventually take less resources than planned for.
If __________, the projects will take more resources than planned for.
Underestimated, Overestimated
Planned, Unplanned
Unplanned, Planned
Overestimated, Underestimated

For building an information system, the function point estimate, based on


data functions, indicates the variety of data input and output needs of the
proposed system, and how they have to be built. (True/False)
TRUE
FALSE
x
x
For efficient management of a software project, the project leader should be
an individual who commits to the entire duration of the project. He/she
should be the person one is to turn to if things are not going well.
(True/False)
TRUE
FALSE
x
x

Which of the following statements is not true about the function point
analysis?
(a) This is a technique to estimate the size and effort, based on one measure,
called the function point, needed to build an information system.
(b) The function point estimate is based on two broad categories of computing
requirements – data functions and transaction functions.
(c) The function point analysis has been shown to be quite effective in
providing an estimate of the size and complexity of the system.
(d) The function point analysis can also account for project- based specificities
such as changes in the project scope and requirements, skill levels of developers,
availability of platforms, etc.

In the early years of computing, the practice was to include the


__________required for a computation.
Resources
Data
Software
Calculations

With advances in programming languages, data came to be maintained in


separate files that different programs could use. Though this improved the
ability to share data, it introduced problems of data __________
Updating
Sharing
Transfers
Migration
The idea of the relational data storage model, put forward by British scientist
E.F. Codd in 1970, became the standard for data storage and use.
TRUE
FALSE
x
x

________ data is created and maintained in databases and follows a certain


data model.
Unstructured
Large
Small
Structured

________ entails deciding who can create, read, update or delete data.
Data Administration
Data Sharing
Data Privilages
Data Permissions

One feature of data independence is that the programs and applications that
use the data are aware of where and how the data is maintained.
TRUE
FALSE
x
x

Match the following benefits database systems with their respective


explanations. (a) Reduced data redundancy (b) Data independence (c) Data
access (d) Data concurrency (e) Application development (i) It ensures that
changes or updates to a particular element in a table are reflected across all
the
(a) (iv) (b) iii ( c) (v) (d) (i) (e) (ii)
(a) (ii), (b) iii, ( c) (v), (d) (i), (e) (iv)
(a) (iv), (b) ii, ( c) (v), (d) (i), (e) (iii)
(a) (iv), (b) iii, ( c) (v), (d) (ii), (e) (i)

Which of the following statements is not true about data consistency?


(a) The data in the data system is the same regardless of the application
through which the user accesses it.
(b) Data integrity is maintained, that is, data has not been changed or corrupted
in a manner unknown to the system.
(c) Data is valid and accurate.
(d) None of the above.

For each record, there should be at least one field that uniquely identifies the
record. This unique field is called a __________ __________.
Primary Key
Secondary Key
Tertiary Key
Data Key

Enterprise or organisational databases are accessed by all members of the


organisation. These are typically organised in the __________ mode.
Client server
Server side
Client Side computer
Server side software

_______ are designed on the client–server model, with a two-tier or three-tier


architecture.
de-centrlised Database
Centrlised Database
Linux Servers
VPN Servers

Workgroup databases or function databases are not designed to be shared


across employees in an organisation.
TRUE
FALSE
x
x

Middleware is a special class of software that is used to connect disparate


databases.
TRUE
FALSE
x
x

NMIMS MCQs - Information System For


Managers

Which of the following statements is not true about fields, records and files
of a database?
(a) A database is a collection of files where data is stored.
(b) The basic structure of a file in a database is a field that is a defined space of
specific dimensions, in which data is placed.
(c) Records are a collection of files that have meaning in the context of an
application.
(d) Each record is like a row in a spreadsheet; it consists of a pre- defined
number of fields.

Which of the following statements are true about tables that are contained in
files of a database?
(a) A table contains records. Modern database systems allow creation of very
large tables to include billions of records.
(b) Very large tables may be split and stored on different servers.
(c) In relational databases, tables are related to each other. These relations
allow data to be linked according to some logic and then extracted from the tables.
(d) All of the above

Which of the following statements is not true about the homogeneous and
heterogeneous architectures of decentralised or distributed databases?
(a) In homogeneous architecture, the entire database of a distributed server is
replicated across many servers.
(b) In homogeneous architecture, when data is changed on any one server, the
data on the other servers remains unaffected.
(c) In heterogeneous architecture, databases across the network are not the
same, that is, distributed databases are federated in nature.
(d) In heterogeneous architecture, when application servers draw on the
databases, special algorithms pull together the required data from diverse servers
and present a consolidated picture.

Data pertaining to a particular domain or a problem to be analysed is


maintained in __________ __________ .
Data Marts
Data Administration
Data Key
Data Permissions

__________ __________ __________ is used to analyse and report data on


sales trends, forecasts and other time-series-based analyses.
Offline Processes
Random Processes
Online Analytical Processes
In-Line Processes

__________ __________ __ __________ is a sub-field of artificial


intelligence, which is concerned with finding useful, human- understandable
knowledge from data.
Information discovery in databases
Information discovery in Server
Knowledge discovery in databases
Knowledge discovery in servers

Google has initiated an entire field of mining click-stream data that is known
as __________ __________ .
Server Analytics
Data Mining
Web Analytics
Web tracing
A large retailer found through a __________ __________ analysis that men
in a certain part of the USA were likely to buy beer and diapers on Thursday
evenings.
Market Basket
Mearket Seaarch
Market Mining
Market research

In the dimensional method of warehouse creation, data is stored in a single or


a few, unrelated tables that are given one additional attribute of a timestamp,
which indicates when the data was collected or created. (True/False)
TRUE
FALSE
x
x

Which of the following sentences is not true about the procedure of the
creation of data warehouses?
(a) To create a data warehouse, data is extracted from transactional tables and
pre-processed to remove unwanted data types.
(b) During pre-processing, the data obtained from transactional tables is
maintained in a staging area, a temporary storage area, where the data is scrubbed.
(c) At the scrubbing stage, data is not corrected in any manner. The idea is to
remove clearly recognisable erroneous data from the collection of raw data.
(d) None of the above

Which of the following sentences is not true about data mining?


(a) The original idea of data mining came from the field known as ‘knowledge
discovery in databases’ (KDD).
(b) Data mining means many things simultaneously, such as data storing, data
analysis, use of artificial intelligence techniques, statistical pattern recognition, etc.
(c) Data mining cannot be used with data accumulated in data warehouses.
(d) None of the above

different types of warehouse data that is used for mining? (a) Click-stream
data (b) Point-of-sale purchase data (c) Online search data (d) Text data (i)
The data collected pertains to the search texts that users type in search boxes
on web pages. It shows users’ search topics, the time at which the
(a) (iv), (b) (iii), (c) (i), (d) (ii)
(a) (iv), (b) (ii), (c) (i), (d) (iii)
(a) (iv), (b) (i), (c) (iii), (d) (ii)
(a) (i), (b) (iii), (c) (iv), (d) (ii)

__________ __________ is the form of data that has massive volume,


velocity and variety, and is often used for organisations for key insights.
Big Data
Small Data
Compressed data
Zipped data

Data that can be used to process for valuable information is considered to be


__________, whereas the rest is considered to be __________.
Noise, Signal
Signal, Noise
Data, Signal
Data, Noise

Metadata is particularly crucial for Big Data analysis as it provides


information on the source of the data and some indication of its authenticity.
(True/False)
TRUE
FALSE
x
x

In the context of data veracity, high values for signal-to-noise ratios are
always preferred, and this applies to all Big Data environments. (True/False)
TRUE
FALSE
x
x
Sources of signal in Big Data are: people typing incorrect names or hashtags,
entering wrong or misleading addresses, using pseudonyms during online
conversations, and passing off blogs as authentic news sources, etc.
TRUE
FALSE
x
x

Which of the following statements is not true about the variety of Big Data?
(a) Big Data comes in different forms such as structured, semi- structured,
unstructured and metadata.
(b) Structured data constitutes almost 80% of Big Data.
(c) Unstructured data may be in the form of log files from servers, collection of
tweets, collections of text, video or audio posts on social media sites, logs of chat
sites, etc.
(d) Major sources of semi-structured data are sensors used for IoT. Semi-
structured data is often maintained in XML or JSON languages.

One of the aims of building information systems in organisations has been to


identify and map __________ __________ that can be automated to build
highly complex systems.
Basic Processes
Complex Processes
Intrinsic Processes
Simple Processes

Business processes have a telescopic character. It implies that the nature of a


business process may extend from being one that is very complex to one that
is elementary.
TRUE
FALSE
x
x
NMIMS MCQs - Information System For
Managers

Complexity of a process may extend to the number of activities, persons and


departments it includes as well as the amount of time and effort it takes to
complete.
TRUE
FALSE
x
x

Which of the following are definitions of business processes?


(a) Business processes refer to those business activities that involve the
movement of information between individuals, groups or departments.
(b) Business processes are understood as activities within or across
organisations that involve some inputs, which are transformed to produce desired
outputs.
(c) Business processes may involve inputs that are not just information but
actually are transformations that act on all types of inputs to produce outputs that
are desired by the organisation.
(d) All of the above

Which of the following statements is not true about the example of book
purchase from an online book store discussed in the preceding section?
(a) At least four departments – information systems, marketing, accounts,
inventory and shipping – are involved in the process of selling and shipping the
book to the customer online.
(b) Two external agencies (the bank and the shipping agent) are also involved
for the process to complete.
(c) Since the online book sale process is highly automated, therefore few
people are involved in fulfilling the order.
(d) Reports generated from this process do not reach managers in all
departments.
The _____- spurred deployment of enterprise systems in organisations.
However, it turned out to be a non-problem because the dawn of the year
2000 triggered no catastrophic failures of systems.
Trojan Horse
Y2K
MIS
Y2S

What were the observations of Michael Hammer about the use of computer
technology by organisations for business process re- engineering in 1990?
(a) Hammer observed that organisations were using the power of computers to
reengineer their business processes.
(b) He observed that large-scale computerisation of processes in organisations
was automating manual processes but not changing or re-engineering them to use
the power of computers.
(c) He showed that business process re-engineering allowed managers to
integrate and streamline work processes, using the power of computer technology,
rather than create automated versions of tedious manual processes.
(d) Both (b) and (c)

Which of the following statements is true about the advantages that


organisations derived by using enterprise systems?
(a) Enterprise systems helped organisations move from obsolete technology
and enabled them to bring together a number of legacy systems on one platform.
(b) Enterprise systems encouraged organisations to think of process integration
and put into place those processes that utilised the computing power enabled by
them.
(c) Enterprise systems consisted of ERP systems, SCM systems and CRM
systems.
(d) All of the above

The SAP ERP package does not distinguish between business modules and
business processes.
TRUE
FALSE
x
x
Which of the following is not an open source ERP software?
(a) Adempiere
(b) Microsoft Dynamics
(c) OpenBravo
(d) Compiere

Given below are the SAP four business modules and three functions or
operations of each module. Match them correctly. (a) Sales and marketing
module (b) Human resource management module (c) Manufacturing and
operations module (d) Finance and accounting module (i) Manager self-
service, enterprise com
(a) (iv), (b) (i), (c) (ii), (d) (iii)
(a) (iv), (b) (ii), (c) (i), (d) (iii)
(a) (iv), (b) (i), (c) (iii), (d) (ii)
(a) (i), (b) (iv), (c) (ii), (d) (iii)

Match the following operations or functions of SAP business modules with


their correct descriptions. (a) General ledger accounting (b) Manager self-
service (c) Workforce process management (d) Plant maintenance (e) Sales
management (f) Material management (g) Accounts payable and receivables
(h) Mar
(a) (iv), (b) (v), (c) (i), (d) (viji), (e) (iii), (f) (vii), (g) (vi), (h) (ii)
(a) (v), (b) (iv), (c) (ii), (d) (viji), (e) (iii), (f) (vii), (g) (vi), (h) (i)
(a) (v), (b) (iv), (c) (i), (d) (viji), (e) (iii), (f) (vi), (g) (vii), (h) (ii)
(a) (v), (b) (iv), (c) (i), (d) (viji), (e) (iii), (f) (vii), (g) (vi), (h) (ii)

Small fluctuations in demand at various points of the supply chain result in


fairly high fluctuations in inventories at the end of the chain. This
phenomenon is known as the __________ __________.
Bullwhip effect
Rosen Effect
Bruno Effect
Whip Effect
The purpose of SCM systems is to provide a coordination and planning
platform to link Tier-2 suppliers with the activities of the parent organisation.
TRUE
FALSE
x
x

Which of the following is not related to Just-in-Time (JIT) manufacturing?


(a) JIT manufacturing reduces costs associated with buying and holding
inventories for many days in advance.
(b) It reduces the need for storage space and wastage.
(c) It does not force management to maintain stronger links with their suppliers
and thus reduce uncertainties in supplies.
(d) None of the above.

Which of the following sentences can’t be included in an explanation of the


supply chain?
(a) The supply chain consists of organisations and entities, which demand and
also supply goods and services that ultimately provide services or products to an
end customer.
(b) It is a system of organisations, people, technology and information that
enable material to be moved and processed to a form that the end customer
consumes.
(c) The basic purpose of the supply chain is to integrate suppliers and vendors
of the host organisation that will allow processes to be integrated across
organisational boundaries.
(d) The supply chain is not the logistics chain.

Match the three types of suppliers with their descriptions. (a) Tier-1 suppliers
(b) Tier-2 suppliers (c ) Tier-3 suppliers (i) These suppliers may consist of a
large number of manufacturers, service agencies and financial agencies. They
supply goods and services to Tier-1 suppliers. (ii) These sup
(a) (ii), (b) (i), (c) (iii)
(a) (ii), (b) (iii), (c) (i)
(a) (i), (b) (iii), (c) (ii)
(a) (iii), (b) (i), (c) (ii)
Which of the following is not a task for whose planning and execution SCM
systems are used?
(a) Order management and manufacturing scheduling
(b) Demand assessment and distribution management
(c) PR management
(d) Transport management

In telemarketing, calls made to market goods and services to those


customers, who are already in the database of the firm, are called
Hot Calls
Cold calls
Interline Calls
Outstation Calls

CRM applications are a way to enhance and embellish customer ____-- ,


which are interfaces at which the marketing establishment of a commercial
firm interfaces, directly or indirectly, with a current or potential customer.
Satisfaction
Care centres
Care points
Touch points

Broadly, CRM systems provide functions for two kinds of activities –


analysis and execution. The systems that support analysis are called ____ ,
and the systems that support execution are called ______- .
Analytical CRM, operational CRM
operational CRM , Analytical CRM
Analytical CRM, Functional CRM
Functional CRM, Analytical CRM

The idea of CRM systems is to integrate all functions related to sales and
marketing on a common platform. (True/False)
TRUE
FALSE
x
x

NMIMS MCQs - Information System For


Managers

Vendors use partner relationship management (PRM) systems to manage


their clients through electronic means.
TRUE
FALSE
x
x

Which of the following sales and marketing activities have been integrated
into CRM systems?
(a) Call centres
(b) Telemarketing
(c) Online e-commerce and support
(d) All of the above

Which of the following statements is not true about operational CRM


systems?
(a) These systems provide background data and analysis to personnel on the
sales and marketing teams.
(b) Functions such as telemarketing or email-based publicity are assisted by the
operational CRM.
(c) These systems use data mining and analytics to make demand forecasts,
provide customer profiles, predict consumer behaviour, assess competitor
strategies, etc.
(d) None of the Above

Match the following special marketing tasks that are enabled by the CRM
system with their descriptions. (a) Bundling (b) Up-selling (c) Cross-selling
(d) Service support (i) Refers to providing data and analysis regarding all
activities related to servicing customers – feedback reports, payment info
(a) (iv), (b) (iii), (c) (ii), (d) (i)
(a) (iv), (b) (ii), (c) (iii), (d) (i)
(a) (iv)(b (i), (c) (ii), (d) (iii)
(a) (iv), (b) (iii), (c) (i), (d) (ii)

____ _______- entails training staff in the new procedures, creating new
teams and defining new tasks, creating new reporting relationships, and
creating a new culture in which employees will work.
Project Management
Program Management
System Management
Change management

______ ______ entails that the teams involved in management and


implementation of an enterprise system have to keep a sharp tab on the
deadlines and milestones.
Project Management
Program Management
System Management
Change management

Which of the following statements are true about the failure of enterprise
systems?
(a) Researchers estimate that about 75% of ERP implementation projects fail.
(b) Budget overruns or outright inability to perform after implementation are
two main causes of the failure of enterprise systems.
(c) The Foxmeyer Drug Co in the USA went bankrupt after a failed ERP
implementation.
(d) All of the above

Which of the following are criticisms of enterprise systems or software?


(a) After implementing an enterprise software, firms follow industry practices
embodied in the software. As a result, they do the same things in the same manner
and lose their competitive advantage.
(b) The sharp enterprise-level focus of enterprise systems shuts out the
innovative ways in which employees can change their work practices to meet the
demands of the market.
(c) The changes forced by an enterprise system rupture the organisational
culture. The effect is quite adverse in many cases.
(d) All of the Above

__________ refers to moving some processes of the firm to a partner or a


vendor within a country. __________ refers to moving business processes
overseas to some other country.
Outsourcing, off-shoring
Off-shoring, Outsourcing
Demarcating, Outsourcing
Resourcing, Off-shoring

Multinationals create offices as legal entities in foreign countries and comply


with their laws and regulations. But they have their headquarters in only one
country.
TRUE
FALSE
x
x

Transnationals maintain entirely different entities in different countries,


including separate headquarters in some countries. Their offices in different
countries work independently although they may be in the same line of
business as the original firm.
TRUE
FALSE
x
x

If centralised information systems, located in the USA, are being used in


India, then the Indian tax laws are applicable for the transaction instead of
US tax laws.
TRUE
FALSE
x
x

Which of the following sharing of processes and data pose challenges to


international information systems being used by multinationals?
(a) Careful handling of currencies, languages, time stamps and legal
requirements during data sharing across countries and time zones.
(b) Collecting sales or value added tax (VAT) from customers in different
countries for the sale of the same product.
(c) Tackling complications of tax computations based on components of the
goods being sold in different countries and then blending those with the tax
conditions in a particular country.
(d) All of the above

Which of the following statements would you use to write a note on the
importance of security audit for an organisation?
(a) It is a process to find vulnerabilities in the security features technologies
and practices of an organisation. Conformity to regulatory and contractual
requirements and adherence to the organisation’s established security policies and
objectives are also assessed.
(b) Risk assessment in terms of the value of a potential monetary loss due to a
security failure is also done in security audit.
(c) A typical audit will include examining log files on servers testing known
security weaknesses in software examining data and server access rights and
interviewing users and system administrators about security practices.
(d) All of the above

You might also like