Information Technology for Business

Chapter 01: System and System Concept
Q1.What is a combination or arrangement of parts to form an integrated whole
System 
Q2........... systems are conceptual or nonphysical entities.
Abstract 
Q3.This subsystem handles the interaction of the system with the user
user interface
Q4.What is plan or method of doing something
System 
Q5.This is the second name for EIS
ESS 
Q6........... is defined as the return of part of the output of a system into the input
feedback 
Q7.This is one of the components of EIS
Software 
Q8.what is the science of communication and control
Cybernetics
Q9........... Systems are tangible entities that may be static or dynamic in operation
physical 
Q10.This is the actual invisible component that integrates all the components.
Algorithm 
Q11.This is one of the disadvantages of EIS
System dependent
Q12.This subsystem ensures communication between the different entities of an information system.
Network 
Q13.Fullform of EIS
Executive Information System
Q14.Feedback that seeks to dampen and reduce fluctuations around a norm or standard is termed as ...........
negative feedback
Q15.Interdependency is one of the characteristics of ...........
System 
__________________________
Chapter 02: Information Concepts


Q1............ is often obtained as a result of recordings or observations
data 
Q2.It is the collection and manipulation of items of data to produce meaningful information
data processing
Q3.......... is required for short term planning for middle level managers.
tactical 
Q4.arranging items in some sequence and/or in different sets is ............
sorting 
Q5.IM stands for
Information management
Q6.......... is a set of values of qualitative or quantitative variables
Data 
Q7.This is one of the functions of data processing
validation 
Q8.This is one of the types of information
strategic 
Q9.Ensuring that supplied data is correct and relevant is ..............
validation 
Q10............. concerns a cycle of organizational activity
Information management
Q11.reducing detail data to its main points
Summarization
Q12.collection, organization, analysis, interpretation and presentation of data is ............
analysis 
Q13.separates data into various categories .............
classification 
Q14.Such type of information originates from inside of an organisation
internal 
Q15......... Is transformation of digital information into simplified form
data reduction
________________________
Chapter 03: Structure of MIS and Role of Computer in MIS

Q1.......... accumulate and analyze financial data in order to make good financial management decisions in running the business
FMIS 
Q2.MRS stands for.............
management reporting system
Q3.this is one of the physical components of information system in an organisation
Software
Q4.newspapers, magazines, radio, television are examples of ..........
acquiring information
Q5.......... Technology includes computers hardware, software, DBMS and data communication system
information 
Q6......... means managing the information required to market and sell products through distribution channels.
PIM 
Q7.the important technologies used by information network are computing and ........
telecommunications
Q8.It is an organised portfolio of formal systems for obtaining processing and delivering information in support of the business operations and management of an organisation
MIS 
Q9.......... is the art of getting things done in our lives through information.
PIM 
Q10........... refers the physical data processing equipment and peripheral devices.
hardware 
Q11.......... is broad term given to the instruction or program that directs the operation of the hardware.
software 
Q12.the second name for the information network is ..........
computer network
Q13.......... are used to communicate with different people all over the world easily.
networks 
Q14.The .......... consists of all data utilized by application software.
database 
Q15........... is a process of transferring information over a distance through radio waves and optical signals etc.
Telecommunication
__________________________
Chapter 04: Transaction Processing System and Decision Support System


Q1.This is one of the features of TPS
data integrity
Q2.this is one of the DSS tools for operational management
Queing theory
Q3.this is one of the DSS characteristics
task oriented
Q4........... is an information processing system for business transactions involving the collection, modification and retrieval of all transaction data.
GDSS
Q5.What is fullform of TPS
Transaction processing system
Q6........... is a system based information system that supports business or organizational decision-making activities.
DSS
Q7.Most .......... DSSs are targeted at managers, staff and also product/service suppliers.
data driven
Q8.transaction processing is also known as ............
real time processing
Q9.What is fullform of DSS
Decision Support System
Q10.this is one of the DSS tools for tactical planning
game theory
Q11.transaction processing cycle consists of ........ Steps
Six
Q12.GDSS stands for
group decision support system
Q13.this is one of the DSS tools for strategic planning
expert systems 
Q14........... DSSs are more common, targeted at a broad base of user groups.
Q15.......... DSSs are complex systems that help analyse decisions or choose between different opti
model driven


________________________
Chapter 05: Expert System


Q1.which of the following is an advantage of expert system
storage
automation
dissemination
all of the above
Q2.The .......... is the main processing element of the expert system.
inference engine
Q3........... a user interface is the method by which the expert system interacts with a user.
user interface
Q4.The .......... is a collection of rules or other information structures derived from the human expert.
knowledge base
Q5.this is one of the features of expert system
problem solving
Q6........... contains the data that is received from the user during the expert system session.
working memory
Q7.AI stands for
artificial intelligence
Q8.what is the name of the computer program that have distilled knowledge of an expert
expert system 
Q9.An ......... is a computer program that uses artificial intelligence (AI) technologies
Expert system
Q10.in AI programming a list may contain
cells
fields
pointers
all of the above Correct Answer
Q11.A computer program that have expertise in particular field is called
expert system
Q12.which of the following is component of expert system
user interface
knowledge base
inference engine
all of the above Correct Answer
Q13.The .......... is a collection of rules or other information structures derived from the human expert.
knowledge base
Q14.this is one of the features of expert system
problem solving
Q15.which of the following is an advantage of expert system
storage
automation
dissemination
all of the above Correct Answer
_______________________________
Chapter 06: Enterprise Resource Planning


Q1.which of the following is not an ERP implementation strategy
half implementation 
Q2.this is one of the ERP life cycle phases
adaptation and decision
acquisition and implementation
use and maintenance
all of the above Correct Answer
Q3.which of the following is the part of an organisation
all of the below Correct Answer
people
common goal
resources
Q4.this system is used to support decision making
DSS
Q5.......... is defined as a method for the effective planning of all resources of a manufacturing company
MRP II
Q6.which one of the following doesn't belong to ERP technologies
manufacturing resource planning
Q7.which of the following is not an ERP module
Purchasing
Q8.ERP uses application software to ...... The process of an organisation
Automate
Q9. following is not a part of ERP implementation
Customer.
Q10.this is one of the benefits of ERP
 access to accurate data
improve customer response
both a and b Correct Answer
Q11.AHP stands for
analytical hierarchy process 
Q12.this is one of the basic modules in MRP II
bill of materials 
Q13.which of the following is not a benefit of ERP
Program management 
Q14.BPR stands for
business process redesign
Q15.this is one of the advantage of ERP
business integration
better analysis
latest technology
all of the above Correct Answer
________________________
Chapter 07: Customer Relationship Management and Supply Chain Management

Q1.SCM stands for
Supply chain management
Q2.SFA stands for
sales force automation
Q3......... CRM is a type of CRM in which the business puts the customers first
Strategic
Q4.this is one of the supply chain decisions
location of facilities
Q5......... CRM is based on capturing, interpreting, segregating, storing, modifying, processing, and reporting customer-related data
analytical
Q6......... involves market segmentation, campaigns management, event-based marketing, and promotions
marketing automation
Q7.IVR stands for
interactive voice response
Q8.CRM stands for
customer relatioship management 
Q9.......... allow the various supply chain partners to coordinate their long-term plans
information flows
Q10.this is one of the types of CRM
Strategic
Q11......... is the application of technology to manage selling activities
SFA
Q12......... Is a sequence of processes involved in the production and distribution of commodity
supply chain
Q13.This is one of the customer relationship systems
oracle siebel 
Q14......... CRM is oriented towards customer-centric business processes such as marketing, selling, and services.
Operational
Q15.A ......... is a system of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer
supply chain 
__________________________
Chapter 08: Electronic Commerce


Q1.this is one of the e-commerce activities
corporate purchasing
Q2.low cost of communication is one of the .......... Given by internet
opportunity
Q3.this is one of the examples of financial and information services
online banking
Q4.......... or ecommerce is a term for any type of business, or commercial transaction
electronic commerce
Q5.......... is the concept of businesses communicating electronically certain information that was traditionally communicated on paper
EDI
Q6......... is the use of wireless handheld devices such as cellular phones and laptops to conduct commercial transactions online.
mobile commerce
Q7......... is a transaction of buying or selling online
E-commerce
Q8.This is one of the business opportunities by internet
virtual storefront 
Q9.This is one of the threats of e-commerce
security issues 
Q10.tax avoidance is one of the ........ Of e-commerce
Threats
Q11.......... allows consumers to electronically exchange goods and services with no barriers of time or distance.
E-commerce
Q12.EDI stands for
electronic data interchange
Q13......... is a transaction of buying or selling online
E-commerce
Q14.......... allows consumers to electronically exchange goods and services with no barriers of time or distance.
e-commerce 
Q15.tax avoidance is one of the ........ Of e-commerce
Threats
________________________________
Chapter 09: Social and Legal Aspects of Business


Q1......... is a computer program that, like a medical virus, has the ability to replicate and infect other computers.
Virus
Q2.hacking is a example of ........
cyber crime
Q3......... is a versatile tool that is used in walks of human life and its application is growing day by day
computer
Q4......... is a set of characters that form a string of certain length.
Password
Q5.......... refers to creations of the intellect for which a monopoly is assigned to designated owners by law.
internet process
Q6.......... occurs when a criminal gains access to your personal information
identity theft
Q7.A ......... is a form of right granted by the government to an inventor
patent
Q8.......... is an issue which impacts the lives of many people.
cybercrime
Q9.when someone gains access to your computer or device without permission
Hacking
Q10.This is one of the disadvantages of use of computers
Unemployment
Q11.......... are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage
Worms
Q12.......... or stalking occurs when someone engages in offensive, menacing or harassing behaviour through the use of technology
cyber bullying 
Q13.A ......... gives the creator of an original work exclusive rights to it, usually for a limited time
Copyright
Q14.......... is electronic junk mail
spam
Q15.this is one of the security threats
virus

Comments