Management Information Systems

231. The direct, computer-to-computer exchange of standardized, common business transaction documents between business partners, suppliers, and customers is ______________

  1. EDI
  2. ES
  3. EIS
  4. ERP
Correct answer: (A)
EDI

232. What software organizes, manages, and processes business data concerned with inventory, customers, and vendors?

  1. customer- oriented software
  2. data management software
  3. storage area network network
  4. grid computing software
Correct answer: (B)
data management software

233. Which topology requires a central controller or hub?

  1. Mesh
  2. Star
  3. Bus
  4. Ring
Correct answer: (B)
Star

234. A ______________ is a data communication system spanning states, countries, or, the whole world.

  1. MAN
  2. LAN
  3. WAN
  4. none of the above
Correct answer: (C)
WAN

235. HUB is ______________ Device & Switch is ______________ Device.

  1. Unicast, Multicast
  2. Multicast, unicast
  3. Broadcast, multicast
  4. none of the above
Correct answer: (C)
Broadcast, multicast

236. Which of the following network covers the largest geographical area,

  1. PAN
  2. LAN
  3. MAN
  4. WAN
Correct answer: (D)
WAN

237. What is the powerful, centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices?

  1. Client
  2. Host computer
  3. Terminal
  4. Network
Correct answer: (B)
Host computer

238. Which of the following is a computer based system that stores and, manipulates data that are viewed from a geographical point or reference?

  1. Geographical information System (GIS)
  2. Database System (DS)
  3. Geographic System (GS)
  4. Software System (SS)
Correct answer: (A)
Geographical information System (GIS)

239. An application where only one user accesses the database at a given time is an example of a(n)

  1. single-user database application
  2. multiuser database application
  3. e-commerce database application
  4. data mining database application
Correct answer: (A)
single-user database application

240. In the spiral model risk analysis is performed

  1. In the first loop
  2. in the first and second loop
  3. In every loop
  4. before using spiral model
Correct answer: (C)
In every loop
Page 24 of 45