Welcome to our guide on “MIS” (Management Information Systems), an essential component in today’s business landscape. MIS refers to using technology and systems to manage, process, and analyze data for effective decision-making and organizational management.
We’ll explore the fundamental concepts of MIS and its significance in modern organizations. MIS helps businesses collect, store, and retrieve data from various sources, enabling managers to access timely and relevant information to support their decision-making process.
We’ll delve into the key components of MIS, including databases, software applications, hardware infrastructure, and networking technologies. Understanding these components is crucial for leveraging MIS effectively within an organization.
So, let’s move on to the quiz questions with answers.
Q1. IT developers use APIs to quickly and easily connect diverse data and services to each other.
Select one:
a. True
b. FalseQ2. To reduce product development time, Caterpillar connected its engineering and manufacturing divisions with its active suppliers, distributors, overseas factories, and customers, through __.
Select one:
a. an extranet
b. an intranet
c. a transportation business center
d. a third-party, value-added networkQ3. Efficient Auto Parts is a wholesale distributor. They purchase auto parts in bulk from manufacturers and sell in smaller quantities to regional retail outlets. They understand that carrying excess inventory can be expensive. On the other hand, running out of inventory can lead to lost business. Therefore, they have created a network that their suppliers can log into to check inventory levels for the parts they sell. When inventory levels reach an agreed-upon level, the supplier automatically sends more to the distributor, with all the documentation being handled electronically. This system is most likely part of what kind of network?
Select one:
a. Intranet
b. Extranet
c. VPN
d. SocialnetQ4. _ layer protocols include the hypertext transfer protocol (HTTP), file transfer protocol (FTP), simple mail transfer protocol
(SMTP), and simple network management protocol (SNMP).Select one:
a. Transport
b. Data Link
c. Application
d. NetworkQ5. To insure QoS of a network, an alternative to “prioritizing traffic” is to __, which means holding back traffic from non-time
sensitive apps so that apps like voice and video run more effectively.Select one:
a. Throttle traffic
b. Block traffic
c. Re-direct traffic
d. Filter trafficQ6. Amazon has enhanced its voice-automated Alexa with a new standard API called __________which increases the efficiency of the list feature.
Select one:
a. Personal Lister
b. Voice Activator
c. List Skills
d. Catalog ExpanderQ7. One of the methods that could have prevented the Yahoo data breach is __, when a user is asked to enter information
such as username and password, then a mobile app generates and sends a random number code for the user to enter before being granted access to his or her account.Select one:
a. Password Verification
b. Mobile Access Verification
c. Two Factor Authentication
d. Mobile Code AuthenticationQ8. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when traveling overseas. Instead, they bring loaner devices and follow strict security procedures including not connecting to their domestic network while out of the country. These procedures are referred to as _.
Select one:
a. Black Ops procedures
b. Do-Not-Carry rules
c. Foreign Threat Prevention procedures
d. Strict Security standardsQ9. The purpose of the __ is to improve customers’ trust in e-commerce, especially when it comes to online payments, and to
increase the Web security of online merchants.Select one:
a. IT governance
b. Internal control
c. PCI DSS
d. FISMAQ10. __ is the discipline dedicated to protecting information and systems used to process and store it from attack, damage, or
unauthorized access.Select one:
a. Cyber security
b. Information Systems
c. Enterprise Risk Management
d. SQLQ11. A computer security specialist who breaks into protected systems and networks to test and assess their security:
Select one:
a. White Hat hacker
b. Red Hat hacker
c. Black Hat Hacker
d. Gray Hat HackerQ12. Which of these does not attach itself to a host but these self-contained programs can replicate themselves across computers and networks?
Select one:
a. Worm
b. Keylogger
c. Virus
d. BackdoorQ13. Roughly 87% of U.S. organizations are either already using or planning to allow employees to “bring your own device”—BYOD.
Select one:
a. True
b. FalseQ14. The focus of modern BI is to provide visual interactive _ to improve the speed and quality of decision-making at all
management levels and add value to tactical and strategic management processes by supporting data access, interactivity,
analysis, discovery, sharing and data governance.Select one:
a. Dashboard
b. Self-service analytics
c. Data mashup
d. Data visualizationQ15. Which of these is NOT a characteristic of big data?
Select one:
a. Petabytes
b. Exabytes
c. Zettabytes
d. GigabytesQ16. Data generated outside the enterprise from nontraditional data sources include:
Select one:
a. Sensor data
b. Customer relationship management (CRM) systems
c. Web transactions
d. Financial dataQ17. A trended time series remains at about the same level over time, but a constant time series shows a stable linear movement up or down.
Select one:
a. True
b. FalseQ18. _ is a decision-making strategy that involves searching through available alternatives until an acceptable solution is found.
Select one:
a. Satisficing
b. Optimizing
c. Bounded rationality
d. Affinity analysisQ19. Geospatial data is data that have an explicit geographic component, ranging from vector and raster data to tabular data with site locations.
Select one:
a. True
b. FalseQ20. Faceted search defines the relationships between data.
Select one:
a. True
b. FalseQ21. The crawler control module creates look-up tables by extracting words from the webpages and recording the URL where they were found.
Select one:
a. True
b. FalseQ22. When ABC International utilizes social media to solicit new product ideas and suggestions for improving customer satisfaction from current customers, ABC is employing which of these strategies to leverage their social media interactions with consumers on the Web?
Select one:
a. Listening
b. Energizing
c. Supporting
d. EmbracingQ23. The social media technology feature that allows users to decide how to categorize and label information they find online is called __.
Select one:
a. blogging
b. mashups
c. wikis
d. taggingQ24. Which metrics of Social Mention helps you understand if people are feeling positive, negative, or neutral about the topic?
Select one:
a. Strength
b. Passion
c. Sentiment
d. ReachQ25. __ is one in which computers can interpret the meaning of content (data) by using metadata and natural language processing (NLP) to support search, retrieval, analysis, and information amalgamation from both structured and unstructured sources.
Select one:
a. The Semantic Web
b. Folksonomy
c. The Social network
d. Web software development kit
Answers: MIS Quiz Questions
- a
- a
- b
- c
- a
- c
- c
- c
- c
- a
- a
- a
- a
- c
- d
- a
- b
- a
- a
- b
- b
- a
- d
- c
- a