qa mis
TRANSCRIPT
-
7/27/2019 QA MIS
1/8
Unit -1
1. In the 1960s and the 1970s computers could generate information in the form ofReports.
2. MIS provides structured information to track and monitor organizational functions like marketing, finance,
productions and HR.
3. Office automation systems enable managers to send and receive emails to or from subordinates.
4. End user computing systems gives direct computing support for end user productivity and work group
collaboration.
5. Expert systems gives advice to the end users based on the knowledge.
6. Web 2.0 technology is an advanced internet technology encompassing applications like blogs, wikis and
RSS.
7. In MIS, there is no constant need for review of the system. (True/False)
8. The information generated in one department cannot be used by another department to create further
information that can be used by other departments. (True/False)
9. To keep a track on the daily regular activities Operational-level systems will help.
10. Strategic-level systems help the senior executives in your organisation to address issues like planning an
decision making.
11. Management- level systems aid in administrative activities and in decisionmaking.
12. PDAs are systems which are kept on desks in various offices, residences, class rooms, departmental
stores, showrooms, etc. (True/False)
13. It is possible to carry a notebook computer in pockets and hence, it is very convenient to use. (True/False
14. Personal computers can Process data at a very high speed.
15. A PC with Internet offers facility of video conferencing worldwide.16. A processor refers to a unit which processes the Input received in the way it has been instructed.
Unit-2
1. Information provided by MIS to the management aids in Strategic planning, management control and
operational control
2. In order to design a MIS, the 3 components ofOrganisation, and technology management must be clea
understood.
3. Neural network is a process where it is possible to capture the thought process going on in the brain of th
human being.4. Polymorphism allows the behaviour of an object to change according to different parameters.
5. An organisation is a structure that uses the resources from the environment like manpower, raw materials,
capital and returns the output like products and services to the environment. (True/False)
6. User resistance is a major behavioural factor associated with the adoption of new systems. ( True/False)
Unit -3
1. The main aim of the strategic information system is to support the value creation and appropriation.
(True/False)
-
7/27/2019 QA MIS
2/8
2. IS simplifies and processes information quickly, as it is automated.
(True/False)
3. Competitive Strategy is an organisations plan for achieving same level of competitive advantage as its
adversaries.
4. The two basic factors which may be considered to be adopted by organisations in their strategies are Low
cost and Product Differentiation
5. Product differentiation is the degree to which buyers perceive products from alternative suppliers to be
different. (True/False)
6. The buyers of differentiated products may have to pay a price when satisfying their preference for somethin
special, in return for no value. (True/False)
7. Newer technologies change the direction of the value chain. (True/False)
8. Collaboration may be in the interests of the customers since it may result in lower costs, higher quality or
greater reliability.
Unit -4
1. Business Process Re-engineering is a methodology adopted by the management to change
existing processes for achieving business integration and eliminating replication of efforts across various
departments and business units.
2. Business Process is a set of activities undertaken by the organization to accomplish an economic activity
3. In Reverse engineering existing IS analysed using its program code manually or using software.
4. Re-engineering involves redesigning the existing IS to change its functionality.
5. Any organisation will have number ofProcesses aligned with their business activities.
6. Business process re-engineering helps in Reorganisation the entire workforce along with various flows,
minimising the wastages and giving the system a new dimension.
7. A concept called as TQM. is used, to make everybody and all the processes in an organisation contribute
towards better quality.
8. In Technology enabled engineering Management first decides on the technology that best suits its
reengineering initiatives.
9. In Clean State redesigning the organisation redesigns the business process from scratch to meet its
organisational goals.
10. The object oriented BPR methodology builds an Object model of the organisations business and
processes
11. Object modeling generates an ideal model of the business process and must be converted to a real
model.
12. In terms of business process, SCM involves the planning executing and monitoring of associated logistic
and financial operations.
13. The latest trend is the integration of SCM with ERP systems and RFID systems.
-
7/27/2019 QA MIS
3/8
14. BPR is usually associated with job and authority loss as it brings about changes in the job role,
organisational and reporting structure. (True/False)
15. Active participation of end users in the BPR initiative ensures its success. ( True/False)
16. Locus of BPR has moved from internal integration of the organisations processes to inter organisationa
integration of business assets.
17. As many organisations are Implementing ERP software to integrate their operations, are indirectly
embracing BPR.
Unit-5
The MIS goals and objectives should be in relation to management philosophy, policy constraints, business
risks, internal and external environment of the organisation and the business. ( True/False)
2. The organisation's strategic plan need not be the basis for the MIS strategic plan. (True/False)
3. Feasibility is a measure of how beneficial the development of an information system would be to an
organisation. (True/False)
4. The goal of feasibility study is to evaluate alternative systems and to propose the most feasible and desirab
system for development. (True/False)
5. DFD uses few symbols like circles and rectangles connected by arrows to represent information flows.
(True/False)
6. Input Design is defined as the input requirement specification as per a format required by which the user
interacts with the system given the basic data for processing.
7. Conversion is the process of changing from the old system to the new system.
8. Maintenance during the operation of a system ensures that there are no problems or failures in a live
setting.
Unit-6
1. The MIS system design should incorporate the system architecture and should consider the nature of
information to be processed for providing various output to users. (True/False)
2. The functional information is defined as a set of information required by the customer to conduct the
administration and management of the function. (True/False)
3. The sole purpose of the MIS is to produce such information which will reduce the risk of uncertainty in a giv
situation. (True/False)
4. The experts or experienced users are asked to give their best answers this approach is called the Delphi
method. (True/False)
5. Only few business organisations perform successfully on efficient management of certain critical success
factors. (True/False)
6. Perfect Quality just as perfect information, is non-achievable and has cost-benefit implications.
7. The input is processed and Controlled in input and process design.
8. Backup of the data and files are taken to safeguard corruption or loss of data.
9. Proper people organisation is basic to the management of any activity or function. (True/False)
-
7/27/2019 QA MIS
4/8
10. In a decentralised set, the responsibility of acquisition of the data, of providing the information to the users
becomes the centralized function. (True/False)
11. MIS should Integrate business functions with management functions.
12. The MIS is kept under continuous Surveillance so that its open system design is modified according to t
changing information needs.
Unit-7
1. The objective of ERP was to integrate the functions of the manufacturing or a service organisation and
provide real time data to each function. (True/False)
2. The best practices in ERP enable the creation of value by improving customer orientation, reducing wastag
of resources. (True/False)
3. No security features are included within an ERP system to protect against both outsider crime, such as
industrial espionage, and insider crime, such as embezzlement (True/False)
4. IS is enabler forCRM initiative and integrates the customer serving functions of marketing, sales and
customer service.
5. The three phases of CRM are Acquire,, enhance and retain
6. SOA increases the organizations agility and flexibility to serve quickly changing customer needs and face
intense competition.
7. The web services utilise XML a commonly understood language among applications in different computing
platforms.
8. To allow communication between the various modules and database of EAI systems an intermediate layer
called the Middleware is used.
Unit-8
1. DSS uses rules and models for processing data, to support various managerial levels, ranging from top
executives to managers, in their decision making. (True/False)
2. The Transaction Processing System (TPS) is a collection of current or historical data from a number of
applications or groups. (True/False)
3. Manufacturing firms can shorten their supply chain using electronic data Interchange
4. Optimisation such as linear programming are used to determine optimal resource allocation.
5. The DSS database is a collection of current or historical data from a number of applications or groups
6. Artificial Intelligence is the skill and engineering which includes several scientific mathematical functions
formulate an organisational system that can conceive and discharge work like a human being
7. A Neuron is a micro cell which is connected to thousands of other micro cells in the brain.
8. The goal of AI is to develop computers that can Simulate the ability to think, see, hear, walk, talk and feel.
9. The components of an Expert system include software modules and knowledge base.
10. Slicing and dicing OLAP operation allows the data to be viewed from different angles based on time.
11. Drill down OLAP operation is the reverse of the consolidation process and allows the manager to look int
the particulars.
-
7/27/2019 QA MIS
5/8
12. Open Source software refers to applications that are distributed along with their source code.
13. There is legal constraint on the number of simultaneous users when setting up and using open source
software(True/False)
14. If internet gets disconnected then the SaaS application cannot be used. (True/False)
15. SaaS is software delivery model where the application including database is installed on the organizations
computers and servers. (True/False)
Unit-9
1. In an e-business enterprise, traditional people organisation based on 'command and control' principle is
strengthened. (True/False)
2. E-business enterprise is open 24X7 and allows managers, vendors and customers to transact business fro
anywhere. (True/False)
3. Business through internet is termed as e-commerce (True/False)
4. In an e-enterprise, business is conducted manually. (True/False)
5. MIS for an e-business is the same as the conventional MIS design of an organisation. (True/False)
6. E-business systems use Client/server architecture and run on Internet platform.
7. Inter organisation communication applications, like news bulletin, communicating change of rules,
announcements and price revisions are very common in B2C.
8. In C2B model, a customer interacts with information databases such as product catalogues, price informat
and places the order .
9. B2B business models actually run with the help of B2C, C2B and C2C models.
10. Web mastercontrols the website inflow/outflow, content management and regulation of the traffic.
11. The look and feel of e-commerce web site should be Customer-friendly and attractive
12. The job ofWeb administratoris to keep the website very responsive and keep contents latest and up-to-
date.
13. Most popular and widely used messaging system is E-mail and voice-mail
14. When there is a need for communication in real time, systems available are Voice conferencing, video
conferencing and electronic meeting
15. Video conferencing provides capabilities of video and audio for participants situated at different location
16. Video conferencing also becomes an interacting and effective communication system when it has a featur
ofWhite boarding and document sharing
17. In Electronic meeting system participants sit in a meeting room with networked PCs and online screen
projector to discuss the meeting agenda.
18. Web publishing uses websites and portals for storing documents, catalogues, drawings, pictures, etc. fo
sharing.
19. Internet and web technologies are used for forming different interest groups to communicate and share th
information. These groups are popularly known as User groups
-
7/27/2019 QA MIS
6/8
20. The biggest advantage ofE-collaboration is that it taps the collective wisdom, knowledge and experience
of the members.
21. GroupWare is capable of handling core processes like communication, integration, collaboration and
delivery, and expedites processing of transaction, application and system.
Unit-10
1. In Programmed decision making it is necessary for the manager to enumerate all the stages to the
decision making situation and provide the necessary support through rules and a formula for each one of them
2. Transportation models are used in situations involving movement of goods from one place to many
locations
3. When you choose one alternative as a Decision under the selection criteria, the MIS collects the data in th
intelligence phase
4. Assignment model is used in the allotment of work and machines with the resources available.
5. In a systematic decision making situation, the programmed decision making system works efficiently, while
the Open-decision making situation it is not efficient.
6. The response of one manager may not be the same as that of the two other managers, as they differ on the
behavioural platform. (True/False)
7. The behaviour of a manager is not influenced by a fear and an anxiety to maintain his personal image.
(True/False)
8. What if analysis creates confidence in decision making model by painting a picture of outcomes under
different conditions.
9. The Closed systems are deterministic and rule based, therefore, the design needs to have limited flexibility
Unit-11
1. Behavioural models are useful in understanding the behaviour amongst the business variables
2. Management science models are based on the principles of business management,
accounting and econometrics.
3. In- person surveys are one-to-one interviews typically conducted in locations such as shopping malls.
4. Budgeting is used to find out whether the performance is as per the proposed plans and analyse the
deviations.
5. Manpower planning and forecasting are the examples in relation to Personnel management
6. Net present value refers to the discounted value of money for future cash flows to the current period and n
gains compared.
7. Most of the companies, which are in competitive business, rely on the formal Cost accounting systems us
for business decisions and for the cost control.
8. Two types of operations research models are Physical and Mathematical
9. Knowledge management systems handles two types of knowledge. One is tacit and other is
explicit.
Unit 12
-
7/27/2019 QA MIS
7/8
1. LAN may be used to transfer data with reasonably high data transfer rates. (True/False)
2. Packet switching is a WAN technology in which users share common carrier resources. ( True/False)
3. TCP and UDP are the computers that transmit data over networks. (True/False)
4. Internet is a part of WWW. (True/False)
5. One of the benefits of Internet is communication. (True/False)
6. Intranet is a private computer network.
7. With intranets, organisations can make more information available to employees in Less time.
8. Web publishing allows 'cumbersome' corporate knowledge to be maintained and easily accessed througho
the company using Hypermedia, and web technologies.
9. A extranet requires security and privacy.
Unit 13
1. In contemporary IT-savvy organisations, a network is used to move information around the organisation by
connecting computers (True/False)
2. The CIO's role is more oriented towards technology, implementation of projects and streamlining back-offic
operations. (True/False)
3. CIOs are senior executives responsible for all aspects of their companies' information technology and
systems. (True/False)
4. The CFO have taken a leadership role in reengineering their organisations' business processes and the
underpinning IT infrastructures to achieve more productivity, efficiency and valuable use
of information within the enterprise.(True/False)
5. One of the major responsibilities of the CIO is to establish the credibility of the systems organisation
6. Peer to peerbenchmarking provides valuable insights for CIOs into gathering performance comparisons.
7. The challenges include the function of the Information technology in transforming them to global strategic
planning from the intended operations. (True/False)
8. The challenge is to Comprehending the present role and responsibility of CIO and checking why the co-
ordination and co-operation is lacking. (True/False)
Unit 14
1. A Distributed could be a relational or a hypermedia database.
2. The Relational model represents the database as a collection of relations having a set of rows and column
each of which is assigned a unique name.
3. The advantage of a DBMS includes the server in which the data is stored, shared by the clients. (True/Fals
4. Distributed DBMS transactions accesses data only from one site. (True/False)
5. DBMS supports multiple views. (True/False)
6. The property that describes an entity is a Attribute
-
7/27/2019 QA MIS
8/8
7. An attribute will map to zero or more columns in a Relational database
8. The three schema architecture is also referred as Client Server Architecture
9. A Data warehouse is a large data storehouse containing the historical data of the organisation collected fr
various operational, external and other databases for the purpose of business analysis.
10. Data mining is used to expose unseen relationships and trends in the data warehouse.
Unit 15
1. Spyware is the process through which manager tracks and identifies if activities are per the set standards,
leading to achievement common goals. (True/False)
2. Input control is classified further into hardware and software control. (True/False)
3. Trojan horse is a malware that only reproduces and does not cause damage to the system. (True/False)
4. When an attack occurs close down the system. (True/False)
5. In Malfunction type of security hazard, all the components of a system are involved.6. Physical security deals with a number of hazards like fire, natural disaster, etc. while procedural controls
deals with Access control only.
7. Ethics is a study of the principles and practices, which guides to decide whether the action taken is morally
right or wrong. (True/False)
8. Checking technical feasibility protects you from violation or breach of law enacted for privacy protection,
obligation to provide healthy, hygienic, and congenial work atmosphere. (True/False)
9. Respecting ethical values means making a beginning to protect generally accepted individual human rights
(True/False)
10. As Internet and web enabled solutions became common, individual's risk of privacy exposure increased
many fold. (True/False)
11. This activity of capturing data, monitoring its use, and storing happens at the front end without the
knowledge of the user. (True/False)
12. Web bugs are graphic files inserted in e-mail messages and web pages, which monitor the visitor
behaviour. (True/False)