___ is the process of converting a message into a secret code and changing the encoded message back to regular text.
1.Encryption
2.Fraud
3.Encoding
4.Cryptography
Posted Date:-2021-11-30 07:17:43
_____ is software programs that were developed for a general market and that can be purchased in a store.
1.Proprietary software
2.Off-the-shelf software
3.Contract software
4.Application software
Posted Date:-2021-11-30 07:04:53
_____ represent(s) the application of information concepts and technology to routine, repetitive, and usually ordinary business transactions
1.E-commerce
2.Transaction processing systems
3.Management information systems
4.Decision support systems
Posted Date:-2021-11-30 07:17:17
______ gives the computer the ability to make suggestions and act like an expert in a particular field.
1.Decision support systems
2.Virtual reality systems
3.Management information systems
4.Expert systems
Posted Date:-2021-11-30 07:14:23
______ is a collection of single-application software packages in a bundle designed to work similarly so that once you learn the basics for one application, the other applications are easy to learn and use.
1.Bundled software
2.Software suite
3.Productivity applications
4.General purpose software
Posted Date:-2021-11-30 07:09:34
______ is a crime in which the imposter obtains key pieces of personal information in order to impersonate the victim.
1.Social engineering
2.Dumpster diving
3.Computer fraud
4.Identity theft
Posted Date:-2021-11-30 07:20:46
______ is a form of transaction processing in which all transactions are collected into a group and processed together.
1.Accumulation processing
2.Batch processing
3.Data collection
4.data collection
Posted Date:-2021-11-30 07:10:45
_______ communication media is more expensive one in network.
1.Co-axial.
2.Unshielded cable.
3.Twisted Pair.
4.Fibre optics.
Posted Date:-2021-11-30 07:33:46
_______ involves the investigation of new approaches to existing problems.
1.Systems analysis
2.Creative analysis
3.Critical analysis
4.Organizational analysis
Posted Date:-2021-11-30 07:06:29
_______ is a protocol that enables you to copy a file from another computer to your computer.
1.SLIP
2.Usenet
3.Telnet
4.FTP
Posted Date:-2021-11-30 07:08:00
_______ is an Internet service that enables you to log on to another computer and access its public files.
1.Telnet
2.FTP
3.Content streaming
4.Instant messaging
Posted Date:-2021-11-30 07:14:48
_______ is any business-related exchange such as payments to employees, sales to customers, or payments to suppliers.
1.Data
2.E-commerce
3.A transaction
4.Input
Posted Date:-2021-11-30 07:04:29
_______ organizational structure employs individuals, groups, or complete business units in geographically dispersed areas who may never meet face to face in the same room.
1.traditional
2.virtual
3.multidimensional
4.matrix
Posted Date:-2021-11-30 07:08:49
_______ system is concerned with the way information is used for purpose of control and applies technologies.
1.Feedback.
2.Interview.
3.Interaction.
4.Conference.
Posted Date:-2021-11-30 07:29:26
________ are individuals who help users determine what outputs they need from the system and construct the plans needed to develop the necessary programs that produce these outputs.
1.Data entry operators
2.Programmers
3.Database administrators
4.Systems analysts
Posted Date:-2021-11-30 07:11:42
________ attacks have overwhelmed the capacity of some of the Web's most established and popular sites.
1.Spam
2.Credit card fraud
3.Denial-of-service
4.spoofing
Posted Date:-2021-11-30 07:14:00
________ describes various program functions and help users operate the computer system
1.A computer program
2.Documentation
3.Systems software
4.A computer system platform
Posted Date:-2021-11-30 07:15:11
________ is an awareness and understanding of a set of information and ways that information can be made useful to support a specific task or reach a decision
1.Knowledge
2.Data
3.Feedback
4.A process
Posted Date:-2021-11-30 07:18:42
________ is factors that are essential to the success of certain functional areas of an organization.
1.Mission-critical factors
2.Critical success factors
3.Performance objectives
4.Strategic factors
Posted Date:-2021-11-30 07:19:33
________ often referred to as "rules of thumb," are commonly accepted guidelines or procedures that usually lead to a good decision.
1.Optimization models
2.Satisficing models
3.Heuristics
4.Programmed decisions
Posted Date:-2021-11-30 07:16:31
_________ converts ciphertext back into plaintext.
1.Encryption
2.A firewall
3.Decryption
4.An encoder
Posted Date:-2021-11-30 07:05:16
______. focuses on planning, policies, and procedures regarding the use of corporate data and information.
1.CIO
2.systems analyst
3.database administrator
4.system operator
Posted Date:-2021-11-30 07:03:40
A ______ is an abstraction or an approximation that is used to represent reality.
1.Model
2.System parameter
3.System performance standard
4.System
Posted Date:-2021-11-30 07:13:35
According to the ______ theory, organizations adapt to new conditions or alter their practices over time.
1.Change model
2.Organizational learning
3.Organizational culture
4.Continuous improvement
Posted Date:-2021-11-30 07:08:26
BPR means ________
1.Business Product Engineering.
2.Business Process Engineering.
3.Business Product Electronic.
4.Business Process Electronic.
Posted Date:-2021-11-30 07:31:04
CPU means ______
1.Central Process Utility.
2.Central Processing Unit.
3.Central Process Uniformity.
4.Central Process Usage.
Posted Date:-2021-11-30 07:32:59
Day's critical activities and is typically available at the beginning of each workday.
1.Demand report
2.scheduled report
3.key-indicator report
4.exception report
Posted Date:-2021-11-30 07:19:09
In ______________ organization, authority is delegated down the hierarchy.
1.traditional
2.classical
3.operational
4.absolute
Posted Date:-2021-11-30 07:27:37
In compilation process the program is placed in the memory in the form ______
1.octal.
2.binary.
3.hexadecimal.
4.decimal.
Posted Date:-2021-11-30 07:28:01
In MIS ______ plays economically sound and logically in development process.
1.information.
2.data.
3.statements.
4.data flow.
Posted Date:-2021-11-30 07:30:27
Information systems that monitor the elementary activities and transactions of the organizations are ________
1.management-level systems.
2.operational-level systems.
3.knowledge-level systems.
4.strategic systems.
Posted Date:-2021-11-30 07:21:39
Information systems that support the firm in its interaction with its environment are said to be performing within the _______
1.Workgroup sphere of influence
2.Global sphere of influence
3.Enterprise sphere of influence
4.Individual sphere of influence
Posted Date:-2021-11-30 07:11:08
Problems that are routine and have well-defined relationships are called _______
1.Structured problems
2.Programmed decisions
3.Simple problems
4.Heuristics
Posted Date:-2021-11-30 07:18:15
The component of a decision support system that provides decision makers access to a variety of models and assists them in decision making is called the _____
1.Model base
2.model management software
3.database
4.dialogue manager
Posted Date:-2021-11-30 07:10:20
The current major stage in the business use of IS is oriented towards _____
1.Cost reduction and productivity
2.Gaining competitive advantage
3.Strategic advantage and costs
4.Improved customer relationship management
Posted Date:-2021-11-30 07:13:07
The data processing activity that involves rekeying miskeyed or misscanned data is called _____
1.editing
2.data storage
3.data correction
4.data collection
Posted Date:-2021-11-30 07:09:57
The effectiveness of marketing information system depends to a larger extent of ________ from market place to the firm.
1.marketing.
2.advertising.
3.feedback.
4.promoting.
Posted Date:-2021-11-30 07:28:36
The extent to which technology permeates an area or department is called _____
1.Technology diffusion
2.Technology infusion
3.Technology collusion
4.Technology fusion
Posted Date:-2021-11-30 07:04:05
The first stage in the problem-solving process is called the ______________ stage. During this stage, potential problems or opportunities are identified and defined.
1.Choice
2.Design
3.Monitoring
4.intelligence.
Posted Date:-2021-11-30 07:07:14
The four key questions related to fairness in information use are ________
1.cost, timing, content, and frequency
2.notice, consent, accuracy, and authorization
3.knowledge, control, notice, and consent
4.knowledge, accuracy, timing, and permission
Posted Date:-2021-11-30 07:20:00
The information generated at regular intervals is a _______ information.
1.depositing.
2.saving.
3.recurring.
4.collecting.
Posted Date:-2021-11-30 07:29:55
The starting point of MIS planning is general ________ planning.
1.objective.
2.managers.
3.business.
4.firms.
Posted Date:-2021-11-30 07:29:04
The translation of strategic and organizational goals into system development initiatives is called _____
1.Systems development
2.information systems planning
3.project planning
4.project definition
Posted Date:-2021-11-30 07:21:11
The value of information is directly linked to _____
1.its accuracy and completeness
2.its verifiability
3.its simplicity and security
4.how it helps decision makers achieve organizational goals
Posted Date:-2021-11-30 07:15:57
Using ______________ a decision maker can make hypothetical changes to problem data and observe the impact on the results
1.Simulation
2.What-if analysis
3.Optimization
4.Goal-seeking analysis
Posted Date:-2021-11-30 07:06:05
Which of the following is NOT a goal of transaction processing systems?
1.Capture, process, and store transactions
2.Produce a variety of documents related to routine business activities
3.Reduce manual effort associated with processing business transactions
4.Produce standard reports used for management decision making
Posted Date:-2021-11-30 07:07:40
Which of the following SDLCs listed below takes an iterative approach to the systems development process?
1.end user
2.RAD
3.prototyping
4.traditional waterfall
Posted Date:-2021-11-30 07:20:22
Which of the following statements, about the use of decision support systems, is true?
1.They are applied only to the choice phase of the problem-solving process.
2.They are only applied to frequent, recurring problems.
3.They are only applied to highly-structured problems
4.They assist decision makers at all levels within the organization.
Posted Date:-2021-11-30 07:15:34
Whose responsibility is it to see that the potential consequences of IS use are fully considered?
1.IS professionals
2.managers
3.users
4.All of the above
Posted Date:-2021-11-30 07:06:51
With the ________ form of data processing, each transaction is processed immediately.
1.OLTP
2.batch processing
3.active processing
4.automated transaction processing
Posted Date:-2021-11-30 07:05:40