logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Management Information Systems Comments

  • Question
  • What data most likely would not be keyed into the order entry subsystem?


  • Options
  • A. item quantity
  • B. customer number
  • C. item number
  • D. item cost
  • E. None of the above

  • Correct Answer
  • item cost 


  • Management Information Systems problems


    Search Results


    • 1. Which of the following statements is the most accurate?

    • Options
    • A. The degree to which information needs to be summarized increases as one moves up through the management levels
    • B. Low-level managers made unstructured decisions
    • C. Upper managers make unstructured decisions
    • D. Low-level managers need general information about operating activities.
    • E. Middle managers make unstructured decisions
    • Discuss
    • 2. PERT and CPM are:

    • Options
    • A. network techniques
    • B. assignment techniques
    • C. project evaluation techniques
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. EDP auditors can be used in the

    • Options
    • A. implementation phase of MIS development
    • B. planning phase of MIS development
    • C. analysis and design phase of MIS development
    • D. All of the above
    • E. None of the above
    • Discuss
    • 4. A language for simulating models of business activity is:

    • Options
    • A. SPSS
    • B. DL/1
    • C. GPSS
    • D. COBOL
    • E. None of the above
    • Discuss
    • 5. Pillsbury's REACH system is concerned mainly with the accomplishment of

    • Options
    • A. monthly objectives
    • B. weekly objectives
    • C. quarterly objectives
    • D. annual objectives
    • E. None of the above
    • Discuss
    • 6. Which of the following is most responsible for the inability of auditors to uncover computer crimes?

    • Options
    • A. the auditor's lack of knowledge in computer technology
    • B. the prohibitively expensive audit procedures needed to detect computer frauds
    • C. the client's concern that the public will learn of the crime
    • D. the relatively small average take of computer frauds
    • E. None of the above
    • Discuss
    • 7. Which of the following is not one of the qualitative characteristics that information must have?

    • Options
    • A. relevance
    • B. retrievability
    • C. timeliness
    • D. accuracy
    • E. all of the above
    • Discuss
    • 8. The type of information most restricted by a poor interface between generalized data base management systems and special computing system languages is

    • Options
    • A. supervisory
    • B. planning
    • C. priority setting
    • D. limitation
    • E. None of the above
    • Discuss
    • 9. The storage of computer programs and data files are the responsibility of a

    • Options
    • A. librarian
    • B. computer operator
    • C. Data entry operator
    • D. programmer
    • E. None of the above
    • Discuss
    • 10. Within a database, the sequential organization of data by a common key is called:

    • Options
    • A. logical structure
    • B. inverted structure
    • C. simple structure
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment