CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Computer Science
‣
Management Information Systems
Comments
Question
Which of the following is most responsible for the inability of auditors to uncover computer crimes?
Options
A. the auditor's lack of knowledge in computer technology
B. the prohibitively expensive audit procedures needed to detect computer frauds
C. the client's concern that the public will learn of the crime
D. the relatively small average take of computer frauds
E. None of the above
Correct Answer
the prohibitively expensive audit procedures needed to detect computer frauds
Management Information Systems problems
Search Results
1. What data most likely would not be keyed into the order entry subsystem?
Options
A. item quantity
B. customer number
C. item number
D. item cost
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: item cost
2. Which of the following statements is the most accurate?
Options
A. The degree to which information needs to be summarized increases as one moves up through the management levels
B. Low-level managers made unstructured decisions
C. Upper managers make unstructured decisions
D. Low-level managers need general information about operating activities.
E. Middle managers make unstructured decisions
Show Answer
Scratch Pad
Discuss
Correct Answer: The degree to which information needs to be summarized increases as one moves up through the management levels
3. PERT and CPM are:
Options
A. network techniques
B. assignment techniques
C. project evaluation techniques
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: project evaluation techniques
4. EDP auditors can be used in the
Options
A. implementation phase of MIS development
B. planning phase of MIS development
C. analysis and design phase of MIS development
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: All of the above
5. A language for simulating models of business activity is:
Options
A. SPSS
B. DL/1
C. GPSS
D. COBOL
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: GPSS
6. Which of the following is not one of the qualitative characteristics that information must have?
Options
A. relevance
B. retrievability
C. timeliness
D. accuracy
E. all of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: all of the above
7. The type of information most restricted by a poor interface between generalized data base management systems and special computing system languages is
Options
A. supervisory
B. planning
C. priority setting
D. limitation
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: planning
8. The storage of computer programs and data files are the responsibility of a
Options
A. librarian
B. computer operator
C. Data entry operator
D. programmer
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: librarian
9. Within a database, the sequential organization of data by a common key is called:
Options
A. logical structure
B. inverted structure
C. simple structure
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: simple structure
10. We combine hardware, software, people, procedures, and data to create an _____
Options
A. people
B. icons
C. information system
D. on-line
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: information system
Comments
There are no comments.
Enter a new Comment
Save
More in Computer Science:
Artificial Intelligence
Automation System
Computer Fundamentals
Computer Hardware
Database Systems
Digital Computer Electronics
Disk Operating System (DOS)
Electronic Principles
Language Processors
Linux
Management Information Systems
Networking
Object Oriented Programming Using C++
Operating Systems Concepts
System Analysis and Design
Unix
Windows 2000 Server
Windows NT