The Management Information System Quiz will help the students to get an idea about the key concepts of MIS, which is a compulsory subject for almost all business studies and MBA students. This Quiz is designed in such a way that the students will get an idea about the basic concepts of MIS, and they will also learn to apply those concepts in various real-world situations.
Now, let’s get started with some MIS quiz questions and their answer.
Q1. Bandwidth-intensive apps are important to business processes, but they also strain network capabilities and resources. One strategy for regulating a network’s quality or service is to “prioritize traffic” which means:
a. Allocating network resources to users based on seniority in the organization
b. Data and apps that are sensitive to time-delay are given priority on the network
c. Giving priority to mobile transmissions to avoid bottlenecks
d. Restricting traffic from voice and video apps that disproportionally use network bandwidth to times when demand for network resources is low
Q2. The two most commonly used application layer protocols are Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
a. True
b. False
Q3. When security issues are a special concern, companies want to take extra steps to make sure that transmissions can’t be intercepted or compromised. In these situations, they will use a network that encrypts the packets before they are transferred over the network. This solution is called a(n).
a. Intranet
b. Extranet
c. Virtual Private Network (VPN)
d. SecureNet
Q4. Which of the following describes a set of computers connected together for the purpose sharing resources?
a. Computer networkx
b. Bandwidth
c. Circuit switching
d. ISP
Q5. The range of frequencies a transmission media can accommodate without experiencing significant loss in performance is known as VPN.
a. True
b. False
Q6. Dr. Garcia is a business professor at a large state college. At the start of each workday, he opens a Web browser on his office computer to access the university’s Web site. From there, he logs into his institution’s “MyCollege” portal with his username and password. From the portal he can access his email, Web pages for each of his courses, and confidential information about the students he advises. Most likely, Dr. Garcia is using what kind of network when using the portal?
a. Extranet
b. Intranet
C. Socialnet
d. Virtual Private Network (VPN
Q7. To effectively guard against cyberattacks, top management must sponsor and promote security initiatives and fund them as a top priority
a. True
b. False
Q8. Which of these describes software that embeds advertisements in the application. It is considered a legitimate alternative offered to consumers who do not wish to pay for software?
a. Cookie
b. Spamware
c. Adware
d. Spyware
Q9. The director of the Federal Trade Commission (FTC) bureau of consumer protection warned that the agency would bring enforcement action against small businesses that
a. failed to inform the public about network failures in a timely manner
b. failed to transmit sensitive data
c. did not report security breaches to law enforcement
d. lacked adequate policies and procedures to protect consumer data.
Q10. The disconnect between how important people say their online privacy is versus how they actually behave in real life is called
a. privacy paradox
b. general defense controls
c. risk mitigation
d. social engineering
Q11. Malware signature is a unique value that indicates the presence of malicious code.
a. True
b. False
Q12. The success of any type of IT project depends on the commitment and involvement of executive management, also referred to as the tone at the top.
a. True
b. False
Q13. Acceptance, correction, and limitation are three of the risk mitigation strategies.
a. True
b. False
Q14. Which of these is a technology-related challenge that organizations face related to big data?
a. Build high levels of trust between the data science team and the functional managers
b. Understand where big data investments should be focused in the organization
c. Create optimal way to organize big data programs
d. Determine best way of presenting data analysis results to facilitate actionable decision-making
Q15. In addition to the four Vs, human expertise and judgment must be added into the mix when analyzing big data.
a. True
b. False
Q16. __ is a static or interactive electronic interface used to acquire and consolidate data across an organization.
a. Digital dashboard
b. Data mining
c. Mashup
d. Data visualization
Q17. Which of these represents the final phase of decision-making?
a. Design
b. Intelligence
C. Choice
d. Review
Q18. A simple process called drill down can convert postal addresses to geospatial data that can then be measured and analyzed.
a. True
b. False
Q19. Augmented analytics uses machine learning and artificial intelligence to automate data preparation, insight generation and insight explanation to augment how business managers and analysts explore, interpret and share data.
a. True
b. False
Q20. When recommenders are assigned a rank or priority, it describes which of these hybrid recommendation engines?
a. Weighted hybrid
b. Mixed hybrid
c. Cascade hybrid
d. Compound hybrid
Q21. Twitter is a social network where the dominant focus is on reporting both private and public news stories.
a. True
b. False
Q22. A __ is based on the concept of “triples”: subject, predicate, and object.
a. Concept search
b. Ontology-based search
C. Faceted search
d. Natural language search
Q23. Which of these is perhaps the most important priority that companies should use to leverage their social media interactions with consumers on the Web?
a. Listening
b. Energizing
c. Supporting
d. Embracing
Q24. In contrast to traditional media-TV, radio, and magazines-social media makes it possible for users to create and share their own content.
a. True
b. False
Q25. A goal of semantic search is to understand the context or intent of users looking for information to increase the relevance and accuracy of results.
a. True
b. False
Answers
- b
- b
- c
- b
- b
- b
- a
- c
- d
- a
- a
- a
- b
- d
- a
- a
- d
- b
- a
- c
- b
- b
- a
- a
- a