Chapter 5 INFORMATION SYSTEMS
Chapter 5 INFORMATION SYSTEMS
Role of Information Systems Key elements of Information Types of Information Systems Levels of Information
systems Systems
Importance of technology Transaction processing
Information technology VS Data system (TPS) Operational level
information Systems Databases Management information Middle (tactical level)
Database Management system (MIS) Senior level (strategic
General System Concepts and System architecture Decision support system level)
Information Technology Networks (DSS) Use of information
o LAN, WAN, MAN, Executive information systems
Computer systems
Input, output, and storage Intranet, VPN system (EIS)
devices Integrated systems Expert system (ES)
Information technology VS Office automation system
information systems Order processing and
Elements of system inventory control system
System adaptation Personnel system
Control systems ERP
CHAPTER - 5 INFORMATION SYSTEMS (105)
Storage
Finally, storage devices are useful to enable data to be saved for future use.
The globalisation of the business environment has resulted in much more widespread use of portable
laptop computers. Laptops can typically be connected to the organisation’s computer network or to
the Internet from remote locations via a data connection such as Wi-Fi or a phone line. This means,
for example, that a manager can access his e-mails or the organisation’s Intranet system (a system that
looks and feels like the internet but is only available to employees) from anywhere in the world.
1. Keyboards
Keyboards are the most common input device and are part of virtually all computer systems.
Keyboards can be stand-alone and connected to the computer with a cable or through a
wireless connection, or they might be integrated into the computer itself, such as with a
laptop or notebook.
9. Digital cameras
Digital cameras can be found in the form of stand-alone units or they may be integrated into
other technology such as smartphones and tablet computers. Digital cameras capture images
and videos in digital form and allow easy transfer to a computer where they can be
manipulated by software.
Digital cameras are used in many situations whether it is for the development of marketing
material, recording of crime scenes by the police, or by an auditor on a year-end inventory
count.
CHAPTER - 5 INFORMATION SYSTEMS (108)
Output devices
An output device is the part of a computer system that receives the processed data from the computer
and presents it in some way.
Output devices are distinct from input devices which are the parts of the computer that provide data
and instructions. However, technology has advanced to the stage where some devices are a
combination of both input and output such as a touch-sensitive screen.
Output devices come in a number of forms:
1. Primary storage (internal Internal temporary store directly accessible by the CPU that
memory) allows it to process data.
Volatile by nature as it is erased when power is turned off.
Much smaller than secondary or tertiary storage but much
quicker to access (as it has no mechanical parts).
Examples include RAM and ROM plus the CPU’s cache
memory (temporary store of instructions repeatedly required
to run programs – typically up to 2MB (megabytes) in size).
CHAPTER - 5 INFORMATION SYSTEMS (110)
2. Secondary storage Secondary storage is used for data not currently being
(external memory) processed but which may need to be accessed at a later stage,
for example the operating system, documents, music files and
emails. Non-volatile as data remains intact even when
powered off.
Examples include:
Flash memory (USB flash drives or keys)
Floppy disks
CD
DVD
Blu-ray drive
Magnetic tape
Cloud drive
4. Offline storage Offline storage describes any type of data storage that is not
under the control of a processing unit. The medium is
typically recorded on a secondary or tertiary storage device
which is physically removed or disconnected. Off-line storage
therefore needs human intervention to re-connect for
subsequent access.
For example, keeping a copy of all your important files
offline in a separate building.
Information technology
Information technology describes the application of computers and telecommunications equipment to
store, retrieve, transmit and manipulate data.
The term is typically associated with computers and computer networks. However, the full definition
includes other information distribution technology such as television, telephone and radio.
Information system
Information system describes complementary networks of software and hardware that people and
organizations use to collect, filter, process, create and distribute data and information.
Within organisations, information systems support operations, management and decision making.
The term ‘information system’ is broader than ‘information technology’ as it incorporates the way in
which people interact with the technology in support of business processes, as well as the information
and communication technology (hardware and software) itself.
CHAPTER - 5 INFORMATION SYSTEMS (111)
In summary:
System – a set of interacting components that operate together to accomplish a purpose
Business system – a collection of people, machines and methods organised to accomplish a
set of specific functions
Information system – all systems and procedures involved in the collection, storage,
production and distribution of information
Information technology – the equipment used to capture, store, transmit and present
information
Information management – planning, the environment, control and technology
Elements of a system
The elements of a system include:
a) Goals
b) Inputs
c) Processes
d) Outputs
e) The environment
f) Boundary (this limits the system from its environment)
Open and closed systems
Closed systems - the environment has no effect on the system and the system has no effect on the
environment. Examples in the real world are rare and business examples even rarer; one useful example is
that of a scientific experiment.
Open systems - do interact therefore the environment will affect the system and the system will affect the
environment. All businesses, social and information systems are examples of open systems.
System adaptation
Open systems will adapt to their environment with varying degrees of extremity. Examples include:
i. Deterministic systems
¯ Use predetermined rules
¯ Therefore, have predicted operations
¯ Giving predictable outputs
¯ Examples include machines and computer programs
¯ These systems will follow a standard and often have a rule book.
ii. Probabilistic systems
¯ Assign a probability to future events
¯ Their behaviour is less easy to predict
¯ Most businesses are examples of probabilistic systems
¯ When a business sales forecasts it will try to predict sales based on past evidence.
¯ In effect the business tries to change before the event has occurred.
iii. Self-organising or cybernetic systems
¯ Most complex type of system
¯ Continually changing
¯ Adapts to the environment
¯ Example trade union negotiations
CHAPTER - 5 INFORMATION SYSTEMS (112)
Data entry
Data could be entered manually by a person keying the information in. Some systems are
more advanced and support technology-based data entry such as optical character
recognition or magnetic ink character recognition.
Data entry describes any of the techniques used to initially record data into a system. A few
examples of data include:
Sales information
Purchase information
New employee details
Updates to existing employee details
There are following three ways database can be updated (i) Batch processing, and (ii)
Online, (iii) real-time processing.
i. Batch processing:
Batch processing is the collection of a group of similar transactions over a period of time, and
their processing at a single time as a batch. This is an efficient method to update the database
periodically for applications such as monthly payroll processing.
This type of processing has been associated with mainframe centralised type systems. The
method has been reduced in importance with the development of more advanced types of
processing. It still remains an important form of processing as many systems used now, are based
on batch processed systems.
CHAPTER - 5 INFORMATION SYSTEMS (113)
Advantages
¯ Relatively easy to develop
¯ Less processing power is required as deals with similar updates
¯ Checks in place as part of the systems run
¯ Less hardware required, therefore cheaper.
Disadvantages
¯ Often delays between when a transaction is made and when the master file is updated
and the output generated.
¯ Management information is often incomplete due to out of date data.
¯ Often master files kept off line therefore access may not always be available.
1. Data:
Data are a set of values of qualitative or quantitative variables about one or more persons or
objects. It can exist in various forms: as numbers or text recorded on paper, as bits or bytes
stored in electronic memory, or as facts living in a person's mind. Business data is all the
information that is related to a company, such as sales data, customer contact information,
and even website traffic statistics.
Such data is processed into meaningful and useful information, which is then used for
specific purposes, such as business analysis, control, and decision-making.
2. Database:
Database is an electronic filing system that collects and organizes data and information. It is
the core of business information systems. Key users tap into databases to access the
information they need, whether for placing inventory orders, scheduling production, or
preparing long-range forecasts.
For example, a customer database containing name, address, payment method, products
ordered, price, order history, and similar data provides information to many departments. Big
size companies use very large databases called data warehouses and data marts.
3. DBMS:
DBMS is a software called a database management system, which is used to quickly and
easily enter, store, organize, select, and retrieve data in a database. DBMS software primarily
functions as an interface between the end user and the database, simultaneously managing
the data, the database engine, and the database schema in order to facilitate the organization
and manipulation of data. There are different types of databases and DBMS available
depending upon the needs of a business organization.
The main types of DBMS are:
Hierarchical database
Network database
Relational database
Object-Oriented database
Popular DBMS examples include cloud-based database management systems, in-memory
database management systems (IMDBMS), columnar database management systems
(CDBMS), and NoSQL in DBMS.
CHAPTER - 5 INFORMATION SYSTEMS (115)
4. Networks:
Most businesses use networks to deliver information to employees, suppliers, and customers. A
computer network is a group of two or more computer systems linked together by communications
channels to share data and information. Today’s networks often link thousands of users and can
transmit audio and video as well as data. The best-known computer network is the internet.
Computer networks support a vast range of uses including:
The world wide web (internet)
Sharing software applications such as databases and Worksheets
Email
Sharing devices such as printers, fax machines and scanners
Online booking systems
Instant messaging
Internet-based communication such as Skype
System architectures:
The term system architecture refers to the way in which the components of a computer system such as
printers, PCs and storage devices are linked together and how they interact.
A centralised architecture involves all processing being performed on a single central computer.
Decentralised architectures spread the processing power throughout the organisation at several
different locations. This is typical of the modern workplace given the significant processing power of
modern PCs.
Typical network configurations include star networks, ring networks, bus networks and tree networks.
Client-server computing:
Client-server computing describes one level of interaction found between computers in systems
architecture.
The client is the application that runs on a personal computer or workstation. It relies on a server that
manages network resources or performs special tasks such as storing files, managing one or more
printers, or processing database queries. Any user on the network can access the server’s capabilities.
A server is a machine that is dedicated to providing a particular function or service requested by a
client within a network system.
Servers can range in power from ‘top-end’ super servers, capable of driving thousands of network
users, to ‘low-end’ servers which are typically a powerful personal computer (PC). Different types of
servers might include file servers, network servers, print servers, e-mail servers and fax servers.
File servers manage the data files that are accessible to users of the network. All the shared data files
for the system are held on a file server or are accessible through a file server.
Network servers route messages from terminals and other equipment in the network to other parts of
the network. In other words, network servers manage and control the routing of messages within
computer networks.
The basic types of networks companies use to transmit data—local area networks and wide area
networks—and popular networking applications such as intranets and virtual private networks.
CHAPTER - 5 INFORMATION SYSTEMS (116)
Integrated System
An integrated IT system describes the scenario where all modules of the system are linked and
function together as a system in a coordinated fashion.
For example, an integrated finance system would link a number of underlying modules such as
Accounts payable control
Accounts receivable control
Accruals and prepayments
Bank and cash
Inventory
Purchases
Sales
So, for example a new sales order would be simultaneously reflected in the accounts receivable, sales
and inventory modules.
Creating formal written information security policies to set standards and provide the basis for
enforcement is the first step in a company’s security strategy. Without information security strategies
in place, companies spend too much time in a reactive mode—responding to crises—and don’t focus
enough on prevention.
Another recent concern is about privacy of individuals challenged through collection of personal
information at various forums. The challenge to companies is to find a balance between collecting the
information they need while at the same time protecting individual consumer rights. Many companies
now state in their privacy policies that they will not abuse the information they collect. Regulators are
taking action against companies that fail to respect consumer privacy.
A DSS is a set of related computer programs and data required to assist with the analysis and
decision-making within an organization. DSS were initially developed to overcome the rigid
nature of management information systems.
DSS help businesses by providing quantitative data and predictive models that aid problem-
solving and decision-making. A DSS helps managers make decisions using interactive
computer models that describe real-world processes.
The DSS also uses data from the internal database but looks for specific data that relate to
the problems at hand. It is a tool for answering “what if” questions about what would happen
if the manager made certain changes. In simple cases, a manager can create a spreadsheet
and try changing some of the numbers. For instance, a manager could create a spreadsheet to
show the amount of overtime required if the number of workers increases or decreases. With
models, the manager enters into the computer the values that describe a particular situation,
and the program computes the results. Marketing executives at a furniture company could
run DSS models that use sales data and demographic assumptions to develop forecasts of the
types of furniture that would appeal to the fastest-growing population groups.
Characteristics of decision support systems
a) DSS assists managers at the tactical level when they are required to make intelligent
guesses
b) A DSS uses formula and equations to enable mathematical modelling
c) DSS are real-time systems enabling managers to solve problems through queries
and modelling
d) User inputs queries and variables for the model through a user interface
e) Contains a natural language interpreter for querying the system
f) The user interface is integrated with data management and modelling software from
the key components
g) Spreadsheet packages can become the tool for the development of a decision
support system.
In addition to the above types of IS, there are some other specialized systems in use as
follows:
6. Financial Reporting System (FRS)
Financial accounting and reporting involves:
Maintaining a system of accounting records for business transactions and other
items of a financial nature; and
Reporting the financial position and the financial performance of an entity in a set
of ‘financial statements’.
Many businesses operate a system of recording their business transactions in accounting
records. This system, that is the part of all sizes of businesses, is called a book-keeping
system or ledger accounting system and forms the foundation of the financial reporting
system.
The information that is recorded in the book-keeping system (ledger records) of an entity is
also analysed and summarised periodically, typically each year, and the summarised
information is presented in financial statements.
Financial statements provide information about the financial position and performance of the
entity.
Financial reporting systems must be reliable, accurate and complete. Access to data entry
should be strictly controlled to authorised personnel only.
7. Order Processing and Inventory Control System
Order processing
The order processing system should be capable of recording all orders accurately and in a
timely fashion. For some businesses such as airlines and hotels the information needs to be
updated immediately, whereas for other businesses an end of day update may be sufficient.
The system will typically be linked to the inventory control system so that the sales person
can establish whether the organisation is capable of fulfilling the order received.
Inventory control system
The objective of the inventory control system is to ensure that the business maintains an
appropriate amount of inventory at all times. The control system should be able to indicate
accurate levels of inventory for all the lines maintained by a business and trigger the
ordering of replacement inventory when inventory levels fall to a certain level.
Characteristics of order processing and inventory control systems
i. The system can accurately report the current inventory level at any time
ii. A rule should be associated with each item that will trigger a reorder such as
minimum inventory level
iii. The age of the inventory can be tracked. This will assist sales managers in
identifying ageing stock and employing tactics to reduce it. This is particularly
important with perishable inventory (e.g., food and drink) that could have hygiene
as well as commercial considerations to monitor.
iv. The system should be able to highlight shortages
v. The system should be able to show individual and total cost of items
vi. The system should maintain supplier details
vii. Delivery dates both inwards and outwards must be maintained to enable the
warehouse manager to manage goods movement - inward and despatch
viii. The location of the inventory should be recorded to ensure it can be found easily
and efficiently
CHAPTER - 5 INFORMATION SYSTEMS (123)
8. Personnel System
The personnel system exists to support the human resources management function in
performing its duties of maintaining an appropriate workforce. This involves:
Recruitment
Selection; and
Staff development and appraisal.
Furthermore, the system contains a significant amount of sensitive and confidential
information meaning there must be strict control around maintaining data security and access
to the system.
Components of personnel system
1. Recruitment
¯ Highlighting internal job vacancies that are available to existing staff
¯ Running external recruitment campaigns and tracking their cost effectiveness
2. Redundancy
¯ Planning and executing voluntary redundancy programs
¯ Planning and executing compulsory redundancies making sure the company
follows all the legal requirements
3. Personnel management and control
¯ Maintaining contract of employment details such as salary, holiday
entitlement and duties
¯ Family and medical contact details
¯ Employment history
¯ Training records
¯ Training plan
¯ Qualifications and skills
¯ Amount of holiday accrued and taken
¯ Sick leave accrued and taken plus authorised absences such as bereavements
¯ Unauthorized absence
¯ Time off in lieu
¯ Disciplinary record
¯ Bonus and pay history
¯ Other rewards and commendations
¯ Annual appraisal
¯ Goals and objectives
¯ Formal checks such as references
4. Personnel management reporting – management will benefit from seeing graph
trends and summary reports to help with making decisions on headcount. These
might include:
- Benefits report
- Headcount (employee numbers) report
- Pay details and total wage expense
- Gender and diversity mix information
- Age profiling
- Tenure profiling
- Absence analysis
CHAPTER - 5 INFORMATION SYSTEMS (124)
Commitments
ERP systems also track the status of commitments such as:
Purchase orders
Employee costs
Customer orders
Tracking is permanently updated irrespective of the department that entered the information
– hence the term ‘enterprise’.
Operational Level:
The operational level is concerned with performing day to day business transactions such as cashiers
at a point of sale, bank tellers, nurses in a hospital, customer care staff, etc. They have defined rules
that guides them while making structured decisions.
Middle Level:
The middle level users generally oversee the activities of the operational management. This includes
middle-level managers, heads of departments, supervisors, etc. They take tactical, unstructured
decisions partly based on set guidelines and judgmental calls.
CHAPTER - 5 INFORMATION SYSTEMS (125)
For example, a credit manager in a bank can check the credit limit and payments history of a
customer and decide to make an exception to raise the credit limit for a particular customer. The
decision is partly structured in the sense that the credit manager has to use existing information to
identify a payments history that benefits the organization and an allowed increase percentage.
Senior Level:
The senior level users make unstructured, strategic decisions. They are concerned with the long-term
planning of the organization. They use information from tactical managers and external data to guide
them when making strategic decisions.
Strategic information relates to long-term decision making e.g. over a 3-5 year time horizon.
Strategic information is useful to senior management and Directors for establishing the overall
strategy of the business. It therefore incorporates both internal information as well as external
information about competitors, the market and the general business environment.
Tactical information assists managers in making short-term tactical decisions such as:
¯ establishing a fee to quote on a particular order
¯ whether to offer discounts on a particular product to help lower excess inventory
¯ whether to switch suppliers
Operational information relates to the day to day activities of an organisation. Examples might
include:
¯ Daily sales reports
¯ Daily production reports
¯ Latest inventory levels
¯ Details of customer complaints
Use Description
1. Planning Help establish appropriate resources, time scales and forecast alternative
outcomes
2. Controlling Ensure processes are implemented as planned
3. Recording Information systems are used to record transactions throughout a business
transactions e.g. sales, purchases, errors, returns, customer complaints and quality
control inspections, deposits and cash movements
4. Performance Compare actual versus planned (budgeted) activity to identify variances
measurement from planned activity and take corrective action as necessary
5. Decision making Information systems are used to help managers make all kinds of decisions
such as volume (e.g. purchases and production), price, whether to make a
component internally or buy it from a supplier, whether to switch suppliers,
when to replace assets and how to organize affairs to minimise a tax charge.
CHAPTER - 5 INFORMATION SYSTEMS (126)
MCQS
For the following questions select the best answer.
Q1. Input, CPU, output & storage are the keys components of:
(a) Computer hardware (b) Computer system
(c) Computer software (d) Computer lab
Q2. Which of the following is the brain of the computer that takes the inputs, processes them and then
outputs the results?
(a) Input devices (b) Output devices
(c) CPU (d) Storage
Q3. ___________consists of the computer themselves plus all the peripheral equipment connected to a
computer for input, output and storage of data.
(a) Computer software (b) Computer Hardware
(c) Computer drives (d) Computer Network
Q4. In many organizations, different computers are connected to each other to form a:
(a) Large system (b) Network system
(c) Super computer (d) Computer system
Q5. The computers that you might encounter as an accountant would typically include:
(a) Super computers (b) Mainframe
(c) Mini computers (d) All of the above
Q6. The most powerful computers typically formed in multinational and other large business, e.g an
airline or oil company not as powerful as a super computer, but still incredibly powerful. What are
these computer called?
(a) Mini – computers (b) Mainframe
(c) Handheld computers (d) Desktop personal computers
Q7. Which of the following computers is similar to Desktop personal computers (PCs) but much smaller?
(a) Mini-Computers
(b) Portable laptops and notebooks computers
(c) Main frame
(d) All of the above
Q8. The globalization of the business environment has resulted in much more widespread use of:
(a) Mainframe computers (b) Mini computers
(c) Portable laptop computers (d) Handheld computers
Q9. Portable laptops can typically be connected to the organization’s computer network or to the internet
form remote location via Wi-Fi or a phone line. This means, for example:-
(a) That a manager can access his e-mails or the organization’s internet system from anywhere
in the world.
(b) Different computers are connected to each other to form a network.
(c) Can be used in national defence and aerospace.
CHAPTER - 5 INFORMATION SYSTEMS (127)
Q19. The part of a computer system that receives the processed data from the computer and presents in
some way is called:
(a) Input device (b) Output device
(c) Central processing unit (d) Storage
Q20. Monitor, printers, speakers & handsets and projectors are the forms of:
(a) Input devices (b) Output devices
(c) Storage devices (d) All of the above
Q21. The different types of storage devices found within a computer system include the following:
(a) External memory (b) Scanners
(c) Projector (d) Printers
Q22. Primary storage / internal memory of any computer system is:
(a) Non-volatile as data remains intact even when powered off.
(b) Volatile by nature as it is erased when power is turned off.
(c) Not directly accessible by the CPU.
(d) Located further from the CPU, therefore takes longer to access.
Q23. Secondary storage (external memory) of any computer system is:
(a) Volatile by nature as it is erased when power is turned off.
(b) Not directly accessible by the CPU.
(c) Directly accessible by the CPU that allows it to process data.
(d) Much quicker to access.
Q24. A computer’s largest secondary storage location is typically its hard disk drive, the capacity of which
would typically fall between:
(a) 20 GB to 1 TB (b) 20 GB to 2 TB
(c) 40 GB to 2 TB (d) 40 GB to 1 TB
Q25. Flash drive and CD are examples of:
(a) Primary storage (b) Secondary storage
(c) Tertiary storage (d) Offline storage
Q26. The storage which typically involves a robotic mechanism that mounts and dismounts removable
mass storage media into a storage device, is called:
(a) Primary storage (b) Secondary storage
(c) Tertiary storage (d) Offline storage
Q27. The storage which describes any type of data storage that is not under the control of processing units
is called:
(a) Primary storage (b) Secondary storage
(c) Tertiary storage (d) Offline storage
CHAPTER - 5 INFORMATION SYSTEMS (129)
Q28. A telecommunications infrastructure that allows computers to exchange data with each other is
known as:
(a) A computer network (b) System adaptation
(c) Cybernetic systems (d) Self – organizing
Q29. The best known computer network is the:
(a) Barcodes and EPOS (b) Optical mark reading (MIR)
(c) Internet (d) Information technology
Q30. Computer networks support a vast range of uses including:
(a) The World Wide Web (b) Online booking system
(c) Instant messaging (d) All of the above
Q31. Internet based communication such as Skype is one of the uses of:
(a) Output device (b) Storage device
(c) Computer networks (d) Online processing
Q32. The way in which the components of a computer system such as printers, PCs and storage devices are
linked together and how they interact is known as:
(a) Database (b) A server
(c) System architecture (d) The world wide web
Q33. All processing being performed on a single central computer is known as:
(a) System architecture (b) Centralized architecture
(c) Decentralized architecture (d) Typical network configurations
Q34. The system which describes the scenario where all modules of the system are linked and function
together as a system in a coordinated fashion is known as:
(a) Closed system (b) Open system
(c) Integrated IT system (d) Deterministic system
Q35. __________describes one level of interaction found between computers in system architecture:
(a) Computer network (b) Information technology
(c) Information system (d) Client server computing
Q36. A machine that is dedicated to providing a particular function or service requested by a client within a
network system is called:
(a) System architecture (b) Server
(c) Output device (d) Input device
Q37. ____________are used to manage the data files that are accessible to users of the network:
(a) System architectures (b) Computer networks
(c) File servers (d) Network servers
Q38. Servers can range in power from top-end’ super servers, capable of driving sever which is typically a
powerful:
(a) Handheld computer (b) Mainframe computer
(c) Super computer (d) Personal computer (P(C)
CHAPTER - 5 INFORMATION SYSTEMS (130)
Q39. A computer network covering a small geographic area such as a home, office, group of building or
school is called:
(a) Telecommunication (b) Local area network
(c) Wide area network (d) System
Q40. A local area network (LAN) includes following distinguishing feature:
(a) Relatively low data transmission errors
(b) Data transfer speeds are much low
(c) Data transmission error rate tends to be significantly higher.
(d) Setup cost are higher
Q41. The computer network that covers a broad area i.e a network that communicates across regional,
metropolitan or national boundaries over a long distance is called:
(a) Telecommunication (b) Local area network
(c) Wide area network (d) System
Q42. A WAN’s distinguishing feature include:
(a) Low cost maintenance (b) Relatively low data transmission errors
(c) Relatively high data transmission (d) The data transfer speeds are high
Q43. ___________has inbuilt control very much like a thermostat in a heating system, they are not
responsive to challenges in the environment:
(a) Open loop control (b) Closed loop control
(c) Open system (d) Closed system
Q44. The stock or a credit control system where the system automatically checks responses is business
example of:
(a) Open system (b) Closed system
(c) Open loop control (d) Closed loop control
Q45. Closed loop control is most suitable for the type of system which is:
(a) Deterministic (b) Probabilistic
(c) Stable (d) Dynamic
Q46. Which of the following does not have inbuilt control as it comes from outside the system?
(a) Open system (b) Closed system
(c) Closed loop control (d) Open loop control
Q47. Which of the following are responsive to the environment and they often involve interaction from
users?
(a) Open system (b) Closed systems
(c) Closed loop control (d) Open loop control
Q48. The elements of a control system include:
(a) Input, process, output (b) Planning, controlling, decision making
(c) Input, controlling, decision making (d) Planning, process, output
CHAPTER - 5 INFORMATION SYSTEMS (131)
Q86. A system that is used to effectively plan the use of a manufacturer's resources. It enables
manufacturers to develop a precise production schedule for the future that minimizes costs and
maximizes the use of the resources available at their disposal.
(a) Enterprise Resource Planning (b) Manufacturing Resource Planning
(c) Human Resource Planning (d) Transaction Processing System
Q87. At the initial level of information systems is an information recording system, which generates initial
summary data collected by _______to produce both regularly scheduled and special reports.
(a) Database (b) DBMS
(c) EIS (d) TPS
CHAPTER - 5 INFORMATION SYSTEMS (135)
Q88. Customer support is often provided in other countries where wage rates are lower. These are example
of _______ and ________
(a) Call centers (b) Outsourcing
(c) Customer advisory centre (d) Customer profile to maintain
Q89. Which one of the following distinguishes the WAN from LAN?
(a) LAN exist under collective or distributed ownership and management covering long
distances, whereas WAN covers small area and owned by a single person.
(b) Setup costs are typically higher and maintaining a LAN is more expensive whereas WAN is
more cost effective and has low maintenance cost.
(c) There is high data transmission error in WAN, in contrast there is relatively low data
transmission errors in LAN.
(d) All of the above
Q90. Out of given, which of the following automates routine and tedious back-office processes, order
processing, and financial reporting?
(a) MSS (b) DSS
(c) TPS (d) EIS
Q91. A system does interact therefore the environment will affect the system and the system will affect the
environment. All businesses, social and information systems are examples of_________.
(a) Closed system (b) Semi-closed system
(c) Semi-open system (d) Open system
Q96. An information system which is used analyzes large amounts of data and presents an organization
with the best possible options available.
(a) MSS (b) DSS
(c) TPS (d) EIS
CHAPTER - 5 INFORMATION SYSTEMS (136)
Q119. CaDet (Cancer Decision Support Tool) is used to identify cancer in its earliest stages.
(a) TPS (b) MSS
(c) DSS (d) ES
Q120. The personnel system exists to support the function in performing its duties of maintaining
appropriate workforce.
(a) IT management (b) Human resources management
(c) Customer management (d) Order management
Q121. Which of the following assists management by providing graph trends and summary reports for
making decisions on head count?
(a) TPS (b) MSS
(c) DSS (d) EIS
Q122. ERP is a _______ system driven by an integrated suite of software modules supporting the basic
internal processes of a business.
(a) Cross country (b) Cross technology
(c) Cross functional (d) Cross cultural
Q123. The _____ level users of information system make unstructured, strategic decisions and use
information from tactical managers and external data to guide them when making strategic decisions
with the help of ______ information system
(a) Middle management (b) Top management
(c) MSS (d) EIS
Q124. This information system typically emphasizes graphical displays and simple user interfaces with a
‘high-level’ executive summary styled dash-board. Directors can then drill-down into various
components of the dashboard to extract more detailed information if required.
(a) TPS (b) MSS
(c) DSS (d) EIS
Q125. A software integrates with your core business operations, like your inventory tracking system,
ecommerce payment gateway, and shipping and handling. You no longer need to bounce through
multiple software programs when you have the answers you need in one place. This is a cross-
functional system driven by an integrated suite of software modules supporting the basic internal
processes of a business.
(a) Manufacturing Resource Planning (b) Enterprise Resource Planning
(c) Organizational Resource Planning (d) Strategic Resource Planning
CHAPTER - 5 INFORMATION SYSTEMS (140)
ANSWERS OF MCQS
1. (b) 2. (c) 3. (b)