Top 250+ Solved Information Systems Management MCQ Questions Answer

From 76 to 90 of 203

Q. Risk management can be defined as the art and science of _________ risk factorsthroughout the life cycle of a project.

a. researching, reviewing, and acting on

b. identifying, analyzing, and responding to

c. reviewing, monitoring, and managing

d. identifying, reviewing, and avoiding

  • a. researching, reviewing, and acting on

Q. Risk Management includes all of the following processes except:

a. Risk Monitoring and Control

b. Risk Identification

c. Risk Avoidance

d. Risk Response Planning

  • c. Risk Avoidance

Q. Risk mitigation involves all but which of the following:

a. Developing system standards (policies, procedures, responsibility standards)

b. Obtaining insurance against loss

c. Identification of project risks

d. Performing contingent planning

  • c. Identification of project risks

Q. Suppose a project has many hazards that could easily injure one or more persons and there is no method of avoiding the potential for damages. The project manager should consider __________ as a means of deflecting the risk.

a. abandoning the project

b. buying insurance for personal bodily injury

c. establishing a contingency fund

d. establishing a management reserve

  • b. buying insurance for personal bodily injury

Q. The focus on defining the activities associated with the system is a __________ methodology.

a. data centered

b. life cycle

c. object-oriented

d. process centered

  • d. process centered

Q. When should a risk be avoided?

a. When the risk event has a low probability of occurrence and low impact

b. When the risk event is unacceptable -- generally one with a very high probability of occurrence and high impact

c. When it can be transferred by purchasing insurance

d. A risk event can never be avoided

  • b. When the risk event is unacceptable -- generally one with a very high probability of occurrence and high impact

Q. Computing systems can provide strategic information by

a. Making decision analysis possible

b. providing corporate models for long-range planning

c. Causing managers to think

d. All of the above

  • d. All of the above

Q. An econometric model requires

a. A computer with large auxiliary storage capacity

b. A data base of economic data

c. A model base of quantitative analysis programs

d. All of the above

  • d. All of the above

Q. Benefits from a computerised MIS include:

a. higher returns on short-term investments

b. less frequent and smaller short-term loans

c. lower rates of interest

d. all of the above

  • d. all of the above

Q. The manager, in using the systems approach, should subdivide the firm into subsystems based on

a. functional areas-marketing, finance, and manufacturing

b. management levels-strategic, tactical, and operational

c. resource flows-manpower, money, machines, and material

d. any of the above represent acceptable subsystem divisions.

  • d. any of the above represent acceptable subsystem divisions.

Q. Functional information subsystems can be classified into

a. communication process wherein information is recorded, stored, processed and retrieved for managerial decision-making

b. communication process wherein data is recorded, stored, processed and retrieved for managerial decision-making

c. communication process wherein data is converted into information

d. all of the above

  • a. communication process wherein information is recorded, stored, processed and retrieved for managerial decision-making

Q. Which of the following is correct for MIS::

a. communication process wherein information is recorded, stored, processed and retrieved for managerial decision-making

b. communication process wherein data is recorded, stored, processed and retrieved for managerial decision-making

c. communication process wherein data is converted into information

d. All of the above

  • b. communication process wherein data is recorded, stored, processed and retrieved for managerial decision-making

Q. The model base contains programs

a. written by the firm's programmers

b. provided by the computer vendor

c. purchased from outside firms, such as software houses

d. All of the above

  • d. All of the above
Subscribe Now

Get All Updates & News