CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Management Information Systems problems
1. What data most likely would not be keyed into the order entry subsystem?
Options
A. item quantity
B. customer number
C. item number
D. item cost
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: item cost
2. Which of the following is most responsible for the inability of auditors to uncover computer crimes?
Options
A. the auditor's lack of knowledge in computer technology
B. the prohibitively expensive audit procedures needed to detect computer frauds
C. the client's concern that the public will learn of the crime
D. the relatively small average take of computer frauds
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: the prohibitively expensive audit procedures needed to detect computer frauds
3. Which of the following is not one of the qualitative characteristics that information must have?
Options
A. relevance
B. retrievability
C. timeliness
D. accuracy
E. all of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: all of the above
4. The type of information most restricted by a poor interface between generalized data base management systems and special computing system languages is
Options
A. supervisory
B. planning
C. priority setting
D. limitation
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: planning
5. The storage of computer programs and data files are the responsibility of a
Options
A. librarian
B. computer operator
C. Data entry operator
D. programmer
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: librarian
6. Within a database, the sequential organization of data by a common key is called:
Options
A. logical structure
B. inverted structure
C. simple structure
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: simple structure
7. We combine hardware, software, people, procedures, and data to create an _____
Options
A. people
B. icons
C. information system
D. on-line
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: information system
8. Quantitative techniques used to solve business problems are called
Options
A. operations management
B. operations science
C. operations research
D. management operations
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: operations research
9. A retailing business involves which of the following functions?
Options
A. engineering
B. maintenance
C. plant operations
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: maintenance
10. EDP auditors can be acquired from
Options
A. computer consulting firms
B. accounting firms
C. general management consulting firms
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: All of the above
First
23
24
25
...
30
..
35
36
Last
More in Computer Science:
Artificial Intelligence
Automation System
Computer Fundamentals
Computer Hardware
Database Systems
Digital Computer Electronics
Disk Operating System (DOS)
Electronic Principles
Language Processors
Linux
Management Information Systems
Networking
Object Oriented Programming Using C++
Operating Systems Concepts
System Analysis and Design
Unix
Windows 2000 Server
Windows NT