Management Information System Computer

Chapter 1 Self Assessment Questions 1. When there is little or no exchange of information within an organization’s infor...

1 downloads 194 Views 550KB Size
Chapter 1 Self Assessment Questions 1. When there is little or no exchange of information within an organization’s information systems, we say that the systems are……………. (a) Independent (b) autonomous (c) Self-sufficient (d) decentralized 2. An example of information to support operational management is……………. (a) Electronic document management system (b) Business Intelligence systems (c) Spreadsheet model of income projections (d) None of these 3. Which form of management provides an organization with overall direction and guidance? (a) Strategic (b) Tactical (c) Organizational (d) None of these 4. ………. information describes the environment surrounding the organization. (a) External (b) Internal (c) Both (d) None of these 5 Information is………. (a) data (b) processed data (c) manipulated input (d) computer output 6. …………………..is the manipulation of information to support decision making. (a) Online analytical processing (b) Planning (c) Opening (d) Capacity determinations 7. A knowledge management system is used to train new employee. (a) True (b) False 8. Decision support systems (DSS) often rely on information from external sources. (a) True (b) False 9. Customer relationship management (CRM) systems help firm’s identify, attract, and retain the most profitable customers. (a) True (b) False 10. Business processes refer to the manner in which work is organized, coordinated, and focused to produce a valuable product or service. (a) True (b) False 11. Systems are audited after implementation to determine whether or not the system met standards. This is an example of (a) Detective contro (b) quality control (c) Quality Assurance (d) Corrective control

12. How many digits of the DNIC (Data Network Identification Code) identify the country? (a) First three (b) First four (c) First five (d) First six 13. The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to (a) 0.003 (b) 0.009 (c) 0.991 (d) 0.999 14. Which of the following is used for modulation and demodulation? (a) Modem (b) Protocols (c).Gateway (d) Multiplexer 15. The Internet Control Message Protocol (ICMP) (a).allows gateways to send error a control messages to other gateways or hosts (b) provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another (c) Reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem (d)All of the above 16. How many hosts are attached to each of the local area networks at your site? (a) 128 (b) 254 (c) 256 (d) 64 17. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? (a) FTP (b) SNMP (c) SMTP (d) RPC 18. Which of the following device is used to connect two systems, especially if the systems use different protocols? (a) Hub (b) Bridge (c) Gateway (d) Repeater 19. A distributed network configuration in which all data/information pass through a central computer is (a) Bus network (b) Star network (c) Ring network (d) Point-to-point network 20. Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? (a) UDP (b) VMTP (c) X.25 (d) SMTP Answers for Self Assessment Questions 1 (d) 2 (a) 3 (a) 4 (a) 6 (a) 7 (b) 8 (a) 9 (a)

5 (b) 10 (a)

11. (b) 16. (b)

12. (a) 17. (c)

13. (b) 18. (c)

14. (a) 19. (b)

15. (d) 20. (a)

Chapter 2 1. The use of computer work stations to send and receive messages is known as (a) electronic funds transfer (b) electronic message switching (c) electronic mail (d) electronic publishing 2. Protecting the data from unauthorized access is called (a) data inaccessibility (b) data encryption (c) data security (d) data validity 3. What is true about supercomputers? (a) They can fit on a single small chip (b) They are found at thousands of places around the world (c) They cost only few thousand rupee (d) They can process billions of operations in a second 4. In a distributed computer system………………. (a) there are many computers and terminals (b) the task is executed by a number of processors (c) the task is distributed throughout the system (d) All of the above. 5. A computer programming language often used by children is (a) LOGO (b) PILOT (c) BASIC (d) PASCAL 6. The linking of computers with a communication system is called (a) networking (b) pairing (c) interfacing (d) assembling 7. The software generally used for what-if analysis is related to…….. (a) word-processing (b) graphics (c) database management (d) None of the above 8. Distributed data entry means that data can be………… (a) entered at different locations where it originates (b) sent to different locations from a central place (c) accessed from different places know as distribution points (d) distributed through a network 9. Software documentation refers to (a) anything written about how the software is designed or functions (b) the documents which, the user has to sign before using the software legally (c) the compatibility of the software with IBM-PC (d) None of the above. 10. If a home computer user wants access to national database networks he/she at least requires……………. (a) a microcomputer, a modem, a telephone line (b) a microcomputer, a tele-printer, a telephone line

(c) a microcomputer, communications soft-ware, a telephone line (d) a microcomputer, a modem, communications software, a telephone line 11. Which of the following factors does not affect the total time taken to generate by using computers? (a) type and format of output required (b) power of the processor (c) speed of the printer (d) place where the computer is kept 12. Which of the following functions of a computer is wrong? (a) it processes the data and delivers the final results to an output device (b) it takes processing steps from the list of instructions called program (c) it stores the program and data in memory. (d) It generates the program on its own. 13. The heart of a computer is (a) CPU (b) Memory (c) I/O Unit (d) Disks 14. A computer consists of……………. (a) a central processing unit (b) a memory (c) input and output units (d) All the above 15. Which of the following is not used as secondary storage? (a) semiconductor memory (b) magnetic disks (c) magnetic drums (d) magnetic tapes 16. Which of the following memory is capable of operating at electronics speed? (a) semiconductor memory (b) magnetic disks (c) magnetic drums (d) magnetic tapes 17. Which of the following is responsible for coordinating various operations using timing signals? (a) Arithmetic-logic unit (b) Control unit (c) Memory unit (b) I/O unit 18. The ALU of a computer normally contains a number of high speed storage elements called (a) semiconductor memory (b) registers (c) hard disk (d) magnetic disk 19. Which of the following is the fastest? (a) CPU (b) Magnetic tapes and disks (c) Video terminal (d) Sensors, mechanical controllers 20. A computer can be defined as an electronic device that can (choose the most precise definition) (a) carry out arithmetical operations (b) carry out logical functions (c) do complicated calculations (d) accept and process data by implementing sequentially a set of stored instructions.

Answers for Self Assessment Questions 1 (c) 2 (c) 3 (d) 4 (a) 6 (a) 7 (a) 8 (b) 9 (d) 11. (a) 12. (a) 13. (a) 14. (a) 16. (b) 17. (b) 18. (b) 19. (b)

5 (a) 10 (b) 15. (a) 20. (d)

Chapter 3 1 MIS personnel must be technically qualified to work with computer............... (a) hardware (b) software (c) information systems (d) All of these. 2. Commonly known development phases in SDLC are.................... (a) planning (b) analysis (c) design (d) All of these. 3. .............................in this study, costs and returns are evaluated to know whether returns justify the investment in the system project. (a) Technical feasibility (b) Economic feasibility (c) Operational feasibility (d) Organizational feasibility 4. ..................the willingness and the ability of the management, employees, customers, suppliers, etc., to operate, use and support a proposed system come under operational feasibility. (a) Technical feasibility (b) Economic feasibility (c) Operational feasibility (d) Organizational feasibility 5. ...........................testing treats the software as a black-box without any understanding of internal behavior (a) Black box (b) White box testing (c) Software testing (d) None of these. 6. .................................. is when the tester has access to the internal data structures and algorithms. (a) Black box (b) White box testing (c) Software testing (d) None of these. 7. DSS application can be composed of following subsystems (a) Data Management subsystem (b) Model Management subsystem (c) Knowledge-based Management subsystem (d) All of these. 8. .............. is an industry term for the broad set of activities that helps a business manages the important parts of its business. (a) SDLC (b) DSS (c) ERP (d) None of these. 9. BI shines a bright light into the heart of a company’s performance. (a). True (b). False

10 The manufacturing module is where much product differentiation happens, including industry-specific functionality. (a). True (b). False 11. The part of machine level instruction, which tells the central processor what has to be done, is (a) Operation code (b) Address (c) Locator (d) Flip-Flop 12. Which of the following system components is responsible for ensuring that the system is working to fulfill its objective? (a) Control. (b) Feedback. (c) Processing. (d) Outputs. 13. In terms of a system, finished products and information are examples of: (a) feedback. (b) processing. (c) control. (d) outputs. 14. Which of the following describes exchanges between a system and other systems or a system and any external agencies? (a) Suprasystem. (b) Environment. (c) Boundary. (d) Subsystem. 15. A system that responds to changes in the environment and modifies its operation accordingly is known as: (a) a soft system (b) a closed system. (c) an adaptive system. (d) a deterministic system. 16. In terms of the resources that support information systems, the procedures used by people are an example of: (a) data resources. (b)technical resources. (c) software resources. (d) hardware resources. 17. Which of the following is not one of the five competitive forces identified by Michael Porter? (a)The threat of substitute products or services. (b)The bargaining power of suppliers. (c)The threat of new entrants (d).The threat of changes in the global economy 18. Which category of computer-based information systems are concerned with supporting the functional areas of an organization? (a) Strategic information systems. (b) Expert systems. (c) Business information systems. (d) Office automation systems. 19. Which category of computer-based information systems are concerned with improving efficiency by applying information technology to common administrative tasks, such as creating business documents? (a) Office automation systems. (b) End user computing systems. (c) Expert systems. (d) Business information systems.

20. Which of the following defines the scope of a system? (a) Environment. (b) Feedback mechanism. (c) Boundary. (d) Process. \Answers for Self Assessment Questions 1 (d) 2 (d) 3 (b) 4 (c) 5 (a) 6 (b) 7 (d) 8 (c) 9 (a) 10 (a) 11. (a) 12. (a) 13. (d) 14. (b) 15. (b) 16. (c) 17. (d) 18. (c) 19. (a) 20. (c)

Chapter 4 1. Which of the following is(are) true of the EDP auditors? (a) they should have computer expertise (b) they will be replaced by traditional auditors in the near future (c) two of the above (d) currently, there is a very high demand for them, particularly from firms that use personal computers 2. Controls of data communication deal with (a) the communication channel (b) the computer (c) terminals (d) All of the above 3. A lockbox service is used for (a) depositing cash when bank is closed (b) paying bank customer bills automatically (c) storing papers in a bank vault (d) depositing payments to bank customers 4. Critical path of the PERT chart is: (a) path which takes the longest time to complete the project (b) the shortest path (c) both of the above (d) path which takes the shortest time to complete the project 5. Inventory is also referred to as: A. stock B. warehouse capacity C. materials D. materials in hand 6. An EOQ formula is an example of a(n) A. B. C. D.

optimizing model static model deterministic model All of the above

. 7. _____ are knowledge based system to which present rules are applied to solve a particular problem. A. ES B. AI C. KBS D. Base rule 0 8. The _____ is a business-oriented data-processing association which publishes a monthly journal, Data Management. A. DPMA B. CDP C. CISA D. ACM 9. The computer can potentially be used to monitor most of our actions, thus robbing us of _____ A. B. C. D.

tapping privacy back log security

10. A systems theory of organization sees the firm as a A. network of resource flows B. system transforming inputs into outputs C. physical system managed by a manager using a conceptual system D. All of the above 11. One of the recent critical challenges facing Major League Baseball was:a. (a)poor coordination between local and national sales channels.b. (b)poorly managed sales channels.c. (c)outdated information systems.d. (d)decreasing ticket sales 12. The six important business objectives of information technology are new products, services,and business models; customer and supplier intimacy; survival; competitive advantage,operational excellence, and:a. (a)improved flexibility.b. (b)improved decision making.c. (c)improved business practices.d. (d)improved efficiency

13. Dell Computer’s use of information systems to improve efficiency and implement “masscustomization” techniques to maintain consistent profitability and an industry lead illustrateswhich business objective?a. (a)Improved flexibilityb. (b)Improved business practicesc. (c)Competitive advantaged. (d)Surviva 14. The use of information systems because of necessity is:a. (a)survivalb. (b)improved business practicesc. (c)competitive advantaged. (d)improved flexibility 15. _____ is the use of a model in an attempt to identify and/or reflect the behaviour of a real person, process, or system. A. master B. decision C. plan D. simulation 16. One of the three most common types of payment systems is the A. pinion fund transaction system B. travel expense reimbursement system C. accounts payable system D. All of the above 17. Which of the following is not an important principle for evaluating the raw data for decision-making: A. selection B. pattern C. everage D. overview 18. The analysis and design of application systems are the responsibility of a _____ A. Computer Operator B. Programmer C. System Analyst D. Data entry operator 19. The model curriculum for information-system education suggested by the _____ has a more theoretical and conceptual basis, whereas the model by the _____ is more practical and applied in nature. A. B. C.

AI, ES KBS, AI ACM, DPMA

D. SISD, MMD 20. Data has to be _____ before it can be converted into information. A. transformed B. processed C. changed D. engineered Answers for Self Assessment Questions 1 (a) 2 (d) 3 (d) 4 (a) 6 (d) 7 (a) 8 (a) 9 (a) 11. (d) 12. (b) 13. (c) 14. (b) 16. (d) 17. (c) 18. (c) 19. (c)

5 (a) 10 (d) 15. (d) 20. (b)

Chapter 5 (1) The device or computer that receives the data is called.................. (a) receiver (a) accepter (a) detector (a) None of these (2) ................ data communications are an essential component of mobile computing. (a) Wire (b) Packed (c) Wireless (d) None of these (3) The transfer of data in the form of electrical signals or continuous waves is called ................ signal (a) local (b) wide area (c) catalogue (d) analogue signal (4) The transfer of data in the form of digit is called digital signal. (a) True (b) False (5) Metropolitan Area Network is spanning a physical area larger than a............ (a) LAN (b) WAN (c) both of these (d) None of these (6) Network topology is the ................ of the various interconnected elements on a computer network (a) find out (b) layout (c) base (d) None of these (7) Software is a general term used for computer Programs (a) True (b) False (8) Wireless communication is not an example of half duplex. (a) True (b) False (9) Management of technology (MOT) is an interdisciplinary..............that integrates science, engineering and management knowledge and practice. (a) field (b) ground (c) lake (d) None of these

(10) Wireless telecommunications is the transfer of information between two or more points that are physically ……………... (a) connected (b) wire connected (c) not connected (d) None of these 11. SUPPORTIVE model of OB is based on : (a). Partnership ( b). Power (c). Economical resources (d). Leadership 12. Organizational behavior is the study of human behavior within an organization at: (a). Individual level (b). group level (c). organizational level (d). all of thes 13. There is person who is highly dedicated to his work, thinks that work is only worship for him. Which kind of personality trait is indicated here: (a). High work ethic orientation (b). Extrovert (c) .High risk taker (d). Machiavellianism 14. A process by which individuals organize & interprets their sensory impressions in order to give meaning to their environment is known as_____________. (a) – Perception (b)ground (c) lake (d) None of these 15. Analysing the business environment best assists in: A) Identifying key competitive forces; identifying competitive position; identifying key opportunities, threats, strengths and weaknesses. B) Auditing macro environmental influences; identifying key competitive forces; identifying competitive position; identifying key opportunities and threats. C) Auditing external and organisational factors; identifying key competitive forces; identifying competitive position; identifying key opportunities and threats. D) Assessing historical trends; auditing environmental dangers; identifying strategic capabilities; identifying competitive position. 16. Assessment of competitive rivalry does NOT include an understanding of: A) The extent to which competitors are in balance. B) Market growth rates. C) Fixed costs, exit barriers and operational efficiency. D) The management structure of an organisation 17. Critical Success Factors are: A) Those product features that are particularly valued by a group of customers and, therefore, where an organisation must excel to outperform competition. B) Those factors which are critical to the success of the organisation's main competitors. C) Both answers A and B.

D) Those product features that a company is particularly competent at providing 18. Market segmentation aims to: A) Identify the similarities and differences between groups of customers or users. B) Identify the similarities between groups of customers or users. C) Identify the differences between organisations and their competitors. D) Identify the needs and wants of all customers or users. 19. What are the bases of market segmentation? A) The business environment; the attractiveness of the market; the purchase/use situation. B) The strength of the competitors; the attractiveness of the market; the organisational structure. C) Strategic capabilities; organisational structure; organisational culture. D) The characteristics of the people/organisations; the purchase/use situation; users' needs and preferences for product characteristics 20. Perceptual output emerges in the form of attitude, opinion ,feelings etc, these are covert part of our behavior (a)true (b)false 1 (a) 2 (c) 3 (d) 4 (a) 5 (b) 6 (b) 7 (a) 8 (b) 9 (a) 10 (c) 11. (d) 12. (d) 13. (a) 14. (a) 15. (b) 16. (d) 17. (a) 18. (a) 19. (d) 20. (a)

Chapter 6 1. Educational programs for the labour union officials are conducted by A. the firm's industrial relations department B. the vice-president of information systems C. both (a) and (b) D. neither (a) nor (b) E. None of the above. 2. Data has to be _____ before it can be converted into information. A. transformed B. processed C. changed D. engineered 3. Which of the following is not true of the EDP Auditors Foundation? A. It publishes a journal, The EDP Auditor

B. It sponsors the CIS A examination. C. It is a professional association of those auditors who specialize in EDP D. It is a member of the AFIPS. 4. The most straightforward resource flow is A. manpower B. machines C. material D. money 5. To _____ is to decide in advance on a course of action. A. master B. decision C. plan D. control 6. The operations file is updated by the A. production control system B. MRP system C. shipping system D. All of the above 7. Operations Research came into being due to: A. medical reasons B. military reasons C. educational reasons D. to improve transportation 8. Order-filling activity in the physical system is triggered by the A. manufacturing information system B. order entry subsystem C. billing subsystem D. accounts receivable subsystem 9. _____ is the ratio of correct information to the total amount of information produced over a period. A. accuracy B. concise C. simulation D. decision 10. Standards are provided by A. standards organizations B. user groups C. computer vendors D. All of the above 11. Which of the following is not a key component of the evaluation process in building a DSS?

A. criteria for evaluation B. means of measuring system-development time spent on the project C. means of monitoring the progress of the DSS D. formal review process 12. If you are an information-system manager, which organization is most appropriate for your interest? A. ACM B. SIM C. ASA D. IEEE 13. The four major corporate resources are money, materials, information, and A. people B. icons C. information system D. on-line 14. An optional facilitates location program can be used to study A. factory location alternative B. warehouse location alternatives C. plant location alternatives D. All of the above 15. A standards manual specifies standards that are to be followed in A. system design B. system operation C. both (a) and (b) D. information system 16. The use of computers in data processing has had several impacts on business. Which of the following is not one of them? A. easier business growth B. fewer clerical workers C. increased data-processing costs D. more and better information neither (a) nor (b) 17. Production machines were first controlled by the computer by means of A. punched cards B. punched paper tape C. magnetic tape D. magnetic cards 18. Encryption is being used primarily with A. file retention B. transaction entry C. computer processing D. data communication 19. Which of the following is(are) true of system analysts? A. their responsibility is to analyze and design system software

B. they may be looked upon as an intermediary between users and programmers C. they are heavily involved with the system-development life cycle D. both (a) and (c) 20. From a data systems design viewpoint, the number of different types of general ledger entries is A. six B. three C. four D. one 1 (c) 6 (c) 11. (d) 16. (c)

2 (b) 7 (d) 12. (b) 17. (b)

3 (d) 8 (b) 13. (a) 18. (d)

4 (a) 9 (c) 14. (d) 19. (d)

5 (b) 10 (a) 15. (c) 20. (c)

Chapter 7 1. System Study involves A. study of an existing system B. documenting the existing system. C. identifying current deficiencies and establishing new goals D. All of the above 2. The primary tool used in structured design is a: A. structure chart B. data-flow diagram C. program flowchart D. module 3. In a _____ one module of the new information system is activates at a time. A. System Development Life Cycle B. CASE tool C. Phased Conversion D. Success factors 4. In Prototyping A. BASIC is used B. COBOL is used C. 4GLs are used D. system is documented 5. The step-by-step instructions that solve a problem are called _____. A. An algorithm B. A list C. A plan D. A sequential structure

6. The approach used in top-down analysis and design is A. to identify the top level functions by combining many smaller components into a single entity B. to prepare flow charts after programming has been completed C. to identify a top level function an d then create a hierarchy of lower-level modules and components. D. All of the above 7. Which of the following is not a factor in the failure of the systems developments projects? A. size of the company B. inadequate user involvement C. failure of systems integration D. continuation of a project that should have been cancelled 8. The primary tool used in structured design is a: A. data-flow diagram B. module C. structure chart D. program flowchart 9. A problem's _____ will answer the question, "What information will the computer need to know in order to either print or display the output times?" A. Input B. Output C. Processing D. Purpose 10. Documentation is prepared A. at every stage B. at system design C. at system analysis D. at system development 11. System Implementation Phase entails A. System check outs B. Pilot run C. Parallel runs D. All of the above 12. Managers who are potential users of the MIS A. select the optimum equipment configurations B. evaluate alternate equipment configurations C. describe information needs D. none of these 13. Data Definition Language (DDL) A. describes how data are structured in the data base B. specifies for the DBMS what is required; the techniques used to process data

C. determine how data must be structured to produce the user's view D. All of the above 14. During the maintenance phase A. System requirements are established B. System analysis is carried out C. Programs are tested D. none of these 15. Problem analysis is done during A. system design phase B. systems analysis phase C. before system test D. All of the above 16. A decision table facilitates conditions to be related to A. actions B. programs C. tables D. operation 18. A _____ is an outline of a process that keeps develop successful information systems (a)System Development Life Cycle B. CASE tool C. Phased Conversion D. Success Factors 19. An appraisal, of a system's performance after it has been installed, is called system A. planning B. review C. maintenance D. batch Processing 20. During the system study, the executive vice-president and the other managers exercise their responsibility of A. planning B. controlling C. directing D. organizing 1 (d) 6 (c) 11. (a) 16. (a)

2 (a) 7 (a) 12. (d) 17. (a)

3 (c) 8 (c) 13. (c) 18. (a)

4 (c) 9 (a) 14. (d) 19. (b)

5 (a) 10 (a) 15. (b) 20. (b)

Chapter-8 Self Assessment Questions 1. The expert system uses a (n) …………. to select the most appropriate response. (a) inference engine (b) decision support system (c) knowledge base (d) data source 2. Which of the following terms is used to describe the computer-based tools used by people in an organization to support their information processing needs? (a) Information Technology (b) User Systems (c) Artifacts (d) Computer Tools 3. Which term refers to the extent of detail provided in information? For instance, some information may provide summary information while others may provide a great amount of detail. (a) Information Depth (b) Aggregate Data (c) Information Granularity (d) Data Detail 4. Which of the following is included in the organizational perspective of information? (a) Time (b) Flow (c) Process (d) Form 5. Which type of technology allows you to send information from one computer to another? (a) Output (b) Telecommunication (c) Connecting (d) CPU 6. Which organizational layer is responsible for developing the goals and strategies as outlined by the top-most level of management? (a) Tactical management (b) Strategic management (c) Operational management (d) No management employees 7. Which of the following is collective information about customers, competitors, business partners, competitive environments, and internal operations? (a) Aggregate Data (b) External Knowledge (c) Business Intelligence (BI) (d) Information Granularity 8. What term is used to describe information coming into a computer that is in bad form, or is incorrect, and will improperly affect the decision-making process? (a) GIGO (b) Tainted data (c) Dirty information (d) Scrubbed data 9. Which type of worker knows how and when to apply technology? (a) Computer scientist (b) Technology-literate knowledge worker (c) Technology analyst (d) Computer savvy 10. Which type of software coordinates the interaction of technology devices? (a) Application software (b) Utility software

(c) RAM (d) Systems software 11. An intranet that is accessible by outside workers. (a) firewall (b) extranet c) management information system (d) P2PN 12. Adding new features is typically performed during the ………. phase. a) implementation b) needs analysis c) development d) maintenance 13. Stockbrokers are individuals or firms who act as middlemen between investors and stock sellers. (a) true (b) false 14. ALU is (a) Arithmetic Logic Unit (b) Array Logic Unit (c) Application Logic Unit (d) None of above 15. CD-ROM stands for (a) Compactable Read Only Memory (b) Compact Data Read Only Memory (c) Compactable Disk Read Only Memory (d) Compact Disk Read Only Memory 16. MSI stands for (a) Medium Scale Integrated Circuits (b) Medium System Integrated Circuits (c) Medium Scale Intelligent Circuit (d) Medium System Intelligent Circuit 17. Database management is not associated with filing and recording, managing, and retrieval of data whenever required. (a) true (b) false 18. Flexibility manufacturing systems (FMSs) can quickly produce a variety of high quality product efficiently. (a) true (b) false 19. Electronic mail, commonly known as email or e-mail, is not a method of exchanging digital messages from an author to one or more recipients. (a) true (b) false 20. In Wireless Networking, students have the opportunity to apply their computing fundamentals to the growing world of wireless communications and technologies. (a) true (b) false Answers for Self Assessment Questions 1. (a) 2. (a) 3. (c) 4. (b) 6. (b) 7. (c) 8. (a) 9. (b) 11. (c) 12. (d) 13. (a) 14. (a) 16. (a) 17. (b) 18. (a) 19. (b)

5. (b) 10. (d) 15. (d) 20. (a)

Chapter-9 Self Assessment Questions 1 What is the term used for describing the judgmental or commonsense part of problem solving? (a) Heuristic (b) Critical (c) Value based (d) Analytical 2 Which of the following is not true regarding the principles of fuzzy logic ? (a) Fuzzy logic is a concept of `certain degree'. (b) Fuzzy logic follows the principle of Aristotle and Buddha. (c) Japan is currently the most active users of fuzzy logic. (d) Boolean logic is a subset of fuzzy logic. 3. Where is the minimum criterion used? (a) When there is an AND operation (b) When there is an OR operation (c) In De Morgan's theorem (d) None of the above 4. Programming a robot by physically moving it through the trajectory you want it to follow is called: (a) contact sensing control (b) continuous-path control (c) robot vision control (d) pick-and-place control 5. To invoke the LISP system, you must enter (a) AI (b) LISP (c) CL (Common Lisp) (d) both b and c 6. Prior to the invention of time sharing, the prevalent method of computer access was: (a) batch processing (b) telecommunication (c) remote access (d) All of the above 7. What is the Fuzzy Approximation Theorem(FAT) ? (a) A fuzzy sytem can model any continous sytem (b) The conversion of fuzzy logic to probability. (c) A continous sytem can model a fuzzy system. (d) Fuzzy patches covering a series of fuzzy rules. 8. The original LISP machines produced by both LMI and Symbolics were based on research performed at: (a) CMU (b) MIT (c) Stanford University (d) RAMD 9. Elementary linguistic units which are smaller than words are: (a) allophones (b) phonemes (c) syllables (d) All of the above 10. Natural language understanding is used in:

(a) natural language interfaces (b) natural language front ends (c) text understanding systems (d) All of the above 11. The first AI programming language was called: (a) BASIC (b) FORTRAN (c) IPL (d) LISP 12. One method of programming a computer to exhibit human intelligence is called modeling or: (a) simulation (b) cognitization (c) duplication (d) psychic amelioration 13. The component of an ICAI (Intelligent Computer-Asslsted Instruction) presenting information to the student is the: (a) student model (b) problem-solving expertise (c) tutoring module (d) All of the above 14. A Transaction Processing System (TPS) is a type of information system that collects, stores, modifies and retrieves the data transactions of an enterprise. (a) true (b) false 15. Data warehousing is not the collection of data from a range of data sources. (a) true (b) false 16. One definition of AI focuses on problem-solving methods that process: (a) smell (b) symbols (c) touch (d) algorithms 17. An intelligent machine would be more flexible than a computer and would engage in the kind of “thinking” that people actually do. (a) true (b) false 18. An Artificial Neural Network (ANN) is not an information processing paradigm that is inspired by the way biological nervous systems, such as the brain, process information. (a) true (b) false 19. The Newell and Simon program that proved theorems of Principia Mathematica was: (a) Elementary Perceiver (b) General Problem Solver (c) Logic Theorist (d) Boolean Algebra 20. On the Internet, an intelligent agent (or simply an agent) is not a program that gathers information or performs some other service without our immediate presence and on some regular schedule. (a) true (b) false Answers for Self Assessment Questions 1. (a) 2. (b) 3. (a) 4. (b) 6. (a) 7. (a) 8. (b) 9. (d) 11. (c) 12. (a) 13. (c) 14. (a)

5. (d) 10. (d) 15. (b)

16. (b)

17. (a)

18. (b)

19. (c)

20. (b)

Chapter-10 1. Which of the following terms is used to describe the computer-based tools used by people in an organization to support their information processing needs? (a) Information Technology

(b) User Systems

(c) Artifacts

(d) Computer Tools

2. Which term refers to the extent of detail provided in information? For instance, some information may provide summary information while others may provide a great amount of detail. (a) Information Depth

(b) Aggregate Data

(c) Information Granularity

(d) Data Detail

3. Which type of technology allows you to send information from one computer to another? (a) Output

(b) Telecommunication

(c) Connecting

(d) CPU

4. Which type of software coordinates the interaction of technology devices? (a) Application software

(b) Utility software

(c) RAM

(d) Systems software

5. The …………accurate the information, the ……..its quality and the ……..managers can rely on it. (a) Less; higher; more (b) More; lower; less (c) More; higher; more (d) Less; higher; less 6. One element in the hardware component of a computer system is: (a) The input devices (b) Data (c) The Internet (d) Windows software

7. When data is organized in a meaningful way, the results are called: (a) An expert system (b) Artificial intelligence (c) Information (d) Database 8. The binary system uses power of (a) 2

(b) 8

(c) 10

(d) 16

9. The brain of any computer system is (a) ALU (b) Memory (c) CPU (d) Control unit 10. Which of the following is the 1's complement of 10? (a) 01 (b) 110 (c) 11 (d) 10 11. Any type of storage that is used for holding information between steps in its processing is (a) CPU (b) Primary storage (c) Intermediate storage (d) Internal storage 12. The section of the CPU that selects interprets and sees to the execution of program instructions. (a) Memory (b) Re gister unit

(c) Control unit (d) ALU 13. The examination and changing of single bits or small groups of his within a word is called (a) Bit (b) Byte (c) Bit manipulation (d) Bit slice 14. Which computer has been designed to be as compact as possible? (a) Mini (b) Super computer (c) Micro computer (d) Mainframe 15. Which of the following individuals typically have less formal, advanced educational degrees and tend to process rather than create information? (a) knowledge workers (b) executives (c) systems analysts (d) data workers 16. Which part interprets program instructions and initiate control operations? (a) Input (b) Storage unit (c) Logic unit (d) Control unit 17. The list of coded instructions is called (a) Computer program (b) Algorithm (c) Flowchart

(d) Utility programs 18. Which term refers to the extent of detail provided in information? For instance, some information may provide summary information while others may provide a great amount of detail. (a)Information Depth (b) Aggregate Data (c) Information Granularity (d) Data Detail 19. Which organizational layer is responsible for developing the goals and strategies as outlined by the top-most level of management? (a) Tactical management (b) Strategic management (c) Operational management (d) No management employees 20. Which type of worker knows how and when to apply technology? (a) Computer scientist (b) Technology-literate knowledge worker (c) Technology analyst (d) Computer savvy 1. (a)

2. (c)

3. (b)

4. (d)

5.(c)

6. (a)

7. (c)

8. (a)

9. (b)

10.(b)

11. (c)

12. (b)

13. (c)

14. (c)

15.(d)

16. (d)

17. (d)

18. (a)

19. (c)

20.(a)

Chapter-11

1. The use of information systems because of necessity is: (a). survival

(b). improved business practices (c). competitive advantage (d). improved flexibility 2. E-business infrastructure which refers to systems interfaces and networks is an application of: (a) processing (b) infrastructure (c) storage; physical (d) application content 3. Business processes: (a) include informal work practices. (b) are used primarily for sales and accounting functions. (c) are governed by information technology. (d) are logically related tasks used primarily by operational personnel. 4. Legal and regulatory compliance is an example of which dimension of business problem? (a) Management (b) Organizational (c) People (d) Ethical 5. Which of the following is not a part of the macro-environment? (a) Competitors' forces. (b) Demographic forces. (c) Political forces. (d) Natural forces. 6. Enterprise Resource Planning (ERP) has been criticized on a number of grounds. Which of the following is not a common criticism of ERP? (a) It doesn’t allow decisions and databases from all parts of the organization to be integrated (b) Implementation is expensive

(c) It can have a disruptive effect on the organization’s operations (d) The effect it has on businesses is disappointing 7. A new infrastructure element for …………..financial reporting (an internet clearing house) is introduced. (a) business (b) e-business (c) business environment (d) Natural forces. 8. Every business requires an infrastructure to support its customers and operations. (a) business (b) Every business (c) Some business (d) none of these 9. The extended enterprise network has to be ………….. to provide any device access. (a) designed (b) architected (c) designed and architected (d) none of these 10. Enterprise systems are software systems that provide core services used across the ……….and on which other applications often are dependent. (a) technology (b) institution (c) university (d) none of these 11. Enterprise computing, an umbrella term used mostly to sell business systems development products traditionally refers to the mission-critical systems on which a business depends. (a) true

(b) false

12. Business drivers are the people, information, and not tasks that support the fulfillment of a business objective.

(a) true

(b) false

13. Enterprise systems are software systems that provide core services used across the institution and on which other applications often are dependent. (a) true

(b) false

14. The extended enterprise network will be unattainable without increased operational efficiency, minimized total cost of ownership (TCO), and increased agility. (a) true

(b) false

……………… 15. What type of system tracks and analyzes transactions made by customers? (a) Decision support systems (b) Tactical systems (c) Customer relationship management systems (d) Knowledge base systems 16. What terms is used to identify technology that is used to support many people working together on one project? (a) E-collaboration (b) I-technology (c) Social networking (d) Knowledge management 17. Which type of system includes all technology systems and software across an organization? (a) Knowledge based systems (b) Strategic information systems (c) Enterprise resource planning systems (d) Management information systems 18. Which of the following ERP providers specialize in providing financial management, distribution, manufacturing, project accounting, human resource management, and business analytics to small-to-medium businesses? (a) SAP (b) Oracle/PeopleSoft

(c) SSA Global (d) Microsoft 19. Which of the following is included in the organizational perspective of information? (a) Time (b) Flow (c) Process (d) Form 20. Which type of worker knows how and when to apply technology? (a) Computer scientist (b) Technology-literate knowledge worker (c) Technology analyst (d) Computer savvy

1. (a)

2. (c)

3. (a)

4. (c)

5.(a)

6. (a)

7. (b)

8. (b)

9. (b)

10.(b)

11. (a)

12. (b)

13. (a)

14. (a)

15.(c)

16. (a)

17. (c)

18. (d)

19. (c)

20.(b)

Chapter-12 Self Assessment Questions 1. ERP system can be used as a tool to help improve the performance level of a ………….. (a) supply chain (b) production (c) organization (d) None of these 2. The model of ERP includes areas such as ………….. (a) banking (b) vendors (c) MRP (d) finance 3. An inventory control system was the software designed to handle traditional ………….. (a) computer system (b) inventory processes (c) ERP (d) one of these

4. The maturity stage of ERP occurred in the ………………. (a) mid-1995s (b) end-1990s (c) starting-1990s (d) mid-1990s 5. The next stage of MRPII evolution was ……………… methodology. (a) software (b) before in time (BIT) (c) just-in-time (JIT) (d) None of these 6. The information made available through an ERP system provides visibility for key performance indicators (KPIs) required. (a) True (b) False 7. …………………. is the advantage of the ERP packages. (a) ERP Inventory (b) ERP finance module (c) Flexibility (d) None of these. 8. The …………….. approaches are not mutually exclusive. (a) “end-to-end” (b) “best-of-breed” (c)Both a and b (d) None of these. 9. ERP provides the backbone for an enterprise-wide……….…... (a) database (b) software (c) information system (d) hardware 10. The integration among business functions facilitates communication and information sharing, leading to dramatic gains in ……...….and speed. (a) productivity (b) quality (c) cost (d) None of these. 11. Departments and divisions within an organization usually have their own ………….. (a) information systems (b) ERP (c) ERP model (d) None of these 12. ERP software is only for…………... (a) medium business (b) large businesses (c) small business (d)Both (a) and (b) 13. The implementation of ERP is defined this stage. (a) Project Planning (b) Preparing for the Venture (c) GAP Analysis (d) None of these 14. Information systems security is responsible for the integrity and safety of system resources and activities. (a) true (b) false 15. 3. ERP System can be used to …………and optimize the existing business process. (a) Reduce (b) Produce (c) Enhance (d) None of these 16. . ……………. is the advantage of the ERP packages. (a) ERP Inventory (b) ERP finance module (c) flexibility (d) None of these

17. The ERP system extends capacity and inventory management to include these valuable resources. (a) cost management (b) inventory management (c) quilt management (d) configuration management 18. Implementation controls audit the systems development process at various points to ensure that the process is properly controlled and managed. (a) true (b) false 19. Data security controls ensure that valuable business data files are subject to unauthorized aiuccess, change, or destruction. (a) true (b) false 20. GDSS contains most of the elements of decision support system plus software to provide effective support in group decision-making settings. (a) true (b) false Answers for Self Assessment Questions 1. (a) 2. (d) 3. (b) 4. (d) 6. (a) 7. (c) 8. (c) 9. () 11. (a) 12. (d) 13. (b) 14. (a) 16. (c) 17. (b) 18. (a) 19. (b)

5. (c) 10. (a) 15. (c) 20. (a)