MIS MCQ 51-75

51. Which of the following non-digital data storage items is most similar to a database?

a. Cash register receipt

b. Library card catalog

c. List of sales totals on a spreadsheet

d. Doctor's office invoice

52. DBMS for midrange computers include all of the following EXCEPT:

a. DB2.

b. Microsoft SQL Server.

c. Oracle.

d. Microsoft Access.

53. An automated or manual file that stores information about data elements and data

characteristics such as usage, physical representation, ownership, authorization, and security

is the:

a. data definition diagram.

b. data dictionary.

c. entity-relationship diagram.

d. relationship dictionary.

54. The most prominent data manipulation language today is:

a. Access.

b. SQL.

c. Crystal Reports.

d. DB2.

55. DBMSs typically include report-generating tools in order to:

a. retrieve and display data.

b. display data in an easier-to-read format.

c. perform predictive analysis.

d. display data in graphs.

56. Which of the following is not one of the techniques used in Web mining?

a. User mining

b. Content mining

c. Usage mining

d. Structure mining

57. A data warehouse is composed of:

a. historic and current internal data.

b. historical data from legacy systems.

c. internal and external data sources.

d. current data.

58. ________ tools are used to analyze large unstructured data sets, such as e-mail, memos,

survey responses, etc., to discover patterns and relationships.

a. Text mining

b. OLAP

c. Web content mining

d. Web mining

59. The special organizational function whose responsibilities include the technical and

operational aspects of managing data, including physical database design and maintenance,

is called:

a. database administration.

b. data auditing.

c. information policy administration.

d. data administration.

60. In TCP/IP, IP is responsible for:

a. disassembling and reassembling of packets during transmission.

b. moving packets over the network.

c. establishing an Internet connection between two computers.

d. sequencing the transfer of packets.

61. Which signal types are represented by a continuous waveform?

a. Laser

b. Optical

c. Analog

d. Digital

62. All network components connect to a single hub in a ________ topology.

a. domain

b. peer-to-peer

c. bus

d. star

63. A network that covers broad geographical regions is most commonly referred to as a(n):

a. intranet.

b. local area network.

c. wide area network.

d. peer-to-peer network.

64. Passive RFID tags:

a. are used in automated toll-collection systems.

b. enable data to be rewritten and modified.

c. have their own power source.

d. have a range of several feet.

65. Inputting data into a poorly programmed Web form in order to disrupt a company's systems

and networks is called:

a. key logging.

b. a Trojan horse.

c. a DDoS attack.

d. an SQL injection attack.

66. The Internet poses specific security problems because:

a. Internet data is not run over secure lines.

b. it changes so rapidly.

c. Internet standards are universal.

d. it was designed to be easily accessible.

67. An independent computer program that copies itself from one computer to another over a

network is called a:

a. Trojan horse.

b. worm.

c. pest.

d. bug.

68. Using numerous computers to inundate and overwhelm the network from numerous launch

points is called a ________ attack.

a. phishing

b. DDoS

c. SQL injection

d. DoS

69. The Gramm-Leach-Bliley Act:

a. specifies best practices in information systems security and control.

b. outlines medical security and privacy rules.

c. requires financial institutions to ensure the security of customer data.

d. imposes responsibility on companies and management to safeguard the accuracy of

financial information.

70. The most common type of electronic evidence is:

a. voice mail.

b. instant messages.

c. spreadsheets.

d. e-mail.

71. Rigorous password systems:

a. are one of the most effective security tools.

b. may hinder employee productivity.

c. are often disregarded by employees.

d. are costly to implement.

72. Why is overstocking warehouses not an effective solution for a problem of low availability?

a. It increases inventory costs.

b. It increases sales costs.

c. It does not speed product time to market.

d. It is an inefficient use of raw materials.

73. Customer relationship management systems typically provide software and online tools for

sales, customer service, and:

a. account management.

b. marketing.

c. advertising.

d. public relations.

74. Customer service modules in CRM systems provide tools for:

a. managing sales prospect and contact information.

b. capturing prospect and customer data.

c. identifying profitable and unprofitable customers.

d. assigning and managing customer service requests.

75. Which of the following is an important capability for sales processes that is found in most

major CRM software products?

a. Returns management

b. Events management

c. Channel promotions management

d. Lead management